Jul 10 00:36:55.987779 kernel: Linux version 5.15.186-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Wed Jul 9 23:09:45 -00 2025 Jul 10 00:36:55.987808 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected verity.usrhash=6cddad5f675165861f6062277cc28875548c735477e689762fc73abc16b63a3d Jul 10 00:36:55.987817 kernel: BIOS-provided physical RAM map: Jul 10 00:36:55.987823 kernel: BIOS-e820: [mem 0x0000000000000000-0x000000000009fbff] usable Jul 10 00:36:55.987828 kernel: BIOS-e820: [mem 0x000000000009fc00-0x000000000009ffff] reserved Jul 10 00:36:55.987834 kernel: BIOS-e820: [mem 0x00000000000f0000-0x00000000000fffff] reserved Jul 10 00:36:55.987840 kernel: BIOS-e820: [mem 0x0000000000100000-0x000000009cfdbfff] usable Jul 10 00:36:55.987858 kernel: BIOS-e820: [mem 0x000000009cfdc000-0x000000009cffffff] reserved Jul 10 00:36:55.987877 kernel: BIOS-e820: [mem 0x00000000b0000000-0x00000000bfffffff] reserved Jul 10 00:36:55.987883 kernel: BIOS-e820: [mem 0x00000000fed1c000-0x00000000fed1ffff] reserved Jul 10 00:36:55.987888 kernel: BIOS-e820: [mem 0x00000000feffc000-0x00000000feffffff] reserved Jul 10 00:36:55.987903 kernel: BIOS-e820: [mem 0x00000000fffc0000-0x00000000ffffffff] reserved Jul 10 00:36:55.987909 kernel: BIOS-e820: [mem 0x000000fd00000000-0x000000ffffffffff] reserved Jul 10 00:36:55.987914 kernel: NX (Execute Disable) protection: active Jul 10 00:36:55.987924 kernel: SMBIOS 2.8 present. Jul 10 00:36:55.987931 kernel: DMI: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.2-debian-1.16.2-1 04/01/2014 Jul 10 00:36:55.987938 kernel: Hypervisor detected: KVM Jul 10 00:36:55.987944 kernel: kvm-clock: Using msrs 4b564d01 and 4b564d00 Jul 10 00:36:55.987953 kernel: kvm-clock: cpu 0, msr 8819a001, primary cpu clock Jul 10 00:36:55.987959 kernel: kvm-clock: using sched offset of 3254447360 cycles Jul 10 00:36:55.987966 kernel: clocksource: kvm-clock: mask: 0xffffffffffffffff max_cycles: 0x1cd42e4dffb, max_idle_ns: 881590591483 ns Jul 10 00:36:55.987972 kernel: tsc: Detected 2794.748 MHz processor Jul 10 00:36:55.987979 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved Jul 10 00:36:55.987987 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable Jul 10 00:36:55.987993 kernel: last_pfn = 0x9cfdc max_arch_pfn = 0x400000000 Jul 10 00:36:55.988000 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT Jul 10 00:36:55.988006 kernel: Using GB pages for direct mapping Jul 10 00:36:55.988014 kernel: ACPI: Early table checksum verification disabled Jul 10 00:36:55.988021 kernel: ACPI: RSDP 0x00000000000F59D0 000014 (v00 BOCHS ) Jul 10 00:36:55.988028 kernel: ACPI: RSDT 0x000000009CFE241A 000038 (v01 BOCHS BXPC 00000001 BXPC 00000001) Jul 10 00:36:55.988034 kernel: ACPI: FACP 0x000000009CFE21FA 0000F4 (v03 BOCHS BXPC 00000001 BXPC 00000001) Jul 10 00:36:55.988040 kernel: ACPI: DSDT 0x000000009CFE0040 0021BA (v01 BOCHS BXPC 00000001 BXPC 00000001) Jul 10 00:36:55.988048 kernel: ACPI: FACS 0x000000009CFE0000 000040 Jul 10 00:36:55.988054 kernel: ACPI: APIC 0x000000009CFE22EE 000090 (v01 BOCHS BXPC 00000001 BXPC 00000001) Jul 10 00:36:55.988061 kernel: ACPI: HPET 0x000000009CFE237E 000038 (v01 BOCHS BXPC 00000001 BXPC 00000001) Jul 10 00:36:55.988067 kernel: ACPI: MCFG 0x000000009CFE23B6 00003C (v01 BOCHS BXPC 00000001 BXPC 00000001) Jul 10 00:36:55.988073 kernel: ACPI: WAET 0x000000009CFE23F2 000028 (v01 BOCHS BXPC 00000001 BXPC 00000001) Jul 10 00:36:55.988079 kernel: ACPI: Reserving FACP table memory at [mem 0x9cfe21fa-0x9cfe22ed] Jul 10 00:36:55.988085 kernel: ACPI: Reserving DSDT table memory at [mem 0x9cfe0040-0x9cfe21f9] Jul 10 00:36:55.988092 kernel: ACPI: Reserving FACS table memory at [mem 0x9cfe0000-0x9cfe003f] Jul 10 00:36:55.988102 kernel: ACPI: Reserving APIC table memory at [mem 0x9cfe22ee-0x9cfe237d] Jul 10 00:36:55.988109 kernel: ACPI: Reserving HPET table memory at [mem 0x9cfe237e-0x9cfe23b5] Jul 10 00:36:55.988115 kernel: ACPI: Reserving MCFG table memory at [mem 0x9cfe23b6-0x9cfe23f1] Jul 10 00:36:55.988122 kernel: ACPI: Reserving WAET table memory at [mem 0x9cfe23f2-0x9cfe2419] Jul 10 00:36:55.988129 kernel: No NUMA configuration found Jul 10 00:36:55.988136 kernel: Faking a node at [mem 0x0000000000000000-0x000000009cfdbfff] Jul 10 00:36:55.988144 kernel: NODE_DATA(0) allocated [mem 0x9cfd6000-0x9cfdbfff] Jul 10 00:36:55.988150 kernel: Zone ranges: Jul 10 00:36:55.988157 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] Jul 10 00:36:55.988164 kernel: DMA32 [mem 0x0000000001000000-0x000000009cfdbfff] Jul 10 00:36:55.988170 kernel: Normal empty Jul 10 00:36:55.988177 kernel: Movable zone start for each node Jul 10 00:36:55.988183 kernel: Early memory node ranges Jul 10 00:36:55.988190 kernel: node 0: [mem 0x0000000000001000-0x000000000009efff] Jul 10 00:36:55.988197 kernel: node 0: [mem 0x0000000000100000-0x000000009cfdbfff] Jul 10 00:36:55.988203 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000009cfdbfff] Jul 10 00:36:55.988214 kernel: On node 0, zone DMA: 1 pages in unavailable ranges Jul 10 00:36:55.988220 kernel: On node 0, zone DMA: 97 pages in unavailable ranges Jul 10 00:36:55.988227 kernel: On node 0, zone DMA32: 12324 pages in unavailable ranges Jul 10 00:36:55.988234 kernel: ACPI: PM-Timer IO Port: 0x608 Jul 10 00:36:55.988240 kernel: ACPI: LAPIC_NMI (acpi_id[0xff] dfl dfl lint[0x1]) Jul 10 00:36:55.988247 kernel: IOAPIC[0]: apic_id 0, version 17, address 0xfec00000, GSI 0-23 Jul 10 00:36:55.988254 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 dfl dfl) Jul 10 00:36:55.988260 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 5 global_irq 5 high level) Jul 10 00:36:55.988267 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) Jul 10 00:36:55.988278 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 10 global_irq 10 high level) Jul 10 00:36:55.988284 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 11 global_irq 11 high level) Jul 10 00:36:55.988291 kernel: ACPI: Using ACPI (MADT) for SMP configuration information Jul 10 00:36:55.988298 kernel: ACPI: HPET id: 0x8086a201 base: 0xfed00000 Jul 10 00:36:55.988304 kernel: TSC deadline timer available Jul 10 00:36:55.988311 kernel: smpboot: Allowing 4 CPUs, 0 hotplug CPUs Jul 10 00:36:55.988318 kernel: kvm-guest: KVM setup pv remote TLB flush Jul 10 00:36:55.988324 kernel: kvm-guest: setup PV sched yield Jul 10 00:36:55.988331 kernel: [mem 0xc0000000-0xfed1bfff] available for PCI devices Jul 10 00:36:55.988339 kernel: Booting paravirtualized kernel on KVM Jul 10 00:36:55.988346 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns Jul 10 00:36:55.988353 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:4 nr_node_ids:1 Jul 10 00:36:55.988359 kernel: percpu: Embedded 56 pages/cpu s188696 r8192 d32488 u524288 Jul 10 00:36:55.988366 kernel: pcpu-alloc: s188696 r8192 d32488 u524288 alloc=1*2097152 Jul 10 00:36:55.988372 kernel: pcpu-alloc: [0] 0 1 2 3 Jul 10 00:36:55.988379 kernel: kvm-guest: setup async PF for cpu 0 Jul 10 00:36:55.988386 kernel: kvm-guest: stealtime: cpu 0, msr 9a41c0c0 Jul 10 00:36:55.988392 kernel: kvm-guest: PV spinlocks enabled Jul 10 00:36:55.988400 kernel: PV qspinlock hash table entries: 256 (order: 0, 4096 bytes, linear) Jul 10 00:36:55.988407 kernel: Built 1 zonelists, mobility grouping on. Total pages: 632732 Jul 10 00:36:55.988414 kernel: Policy zone: DMA32 Jul 10 00:36:55.988421 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected verity.usrhash=6cddad5f675165861f6062277cc28875548c735477e689762fc73abc16b63a3d Jul 10 00:36:55.988429 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Jul 10 00:36:55.988435 kernel: Dentry cache hash table entries: 524288 (order: 10, 4194304 bytes, linear) Jul 10 00:36:55.988442 kernel: Inode-cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) Jul 10 00:36:55.988449 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Jul 10 00:36:55.988457 kernel: Memory: 2436696K/2571752K available (12295K kernel code, 2275K rwdata, 13724K rodata, 47472K init, 4108K bss, 134796K reserved, 0K cma-reserved) Jul 10 00:36:55.988464 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=4, Nodes=1 Jul 10 00:36:55.988471 kernel: ftrace: allocating 34602 entries in 136 pages Jul 10 00:36:55.988478 kernel: ftrace: allocated 136 pages with 2 groups Jul 10 00:36:55.988484 kernel: rcu: Hierarchical RCU implementation. Jul 10 00:36:55.988491 kernel: rcu: RCU event tracing is enabled. Jul 10 00:36:55.988498 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=4. Jul 10 00:36:55.988505 kernel: Rude variant of Tasks RCU enabled. Jul 10 00:36:55.988512 kernel: Tracing variant of Tasks RCU enabled. Jul 10 00:36:55.988520 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Jul 10 00:36:55.988527 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=4 Jul 10 00:36:55.988533 kernel: NR_IRQS: 33024, nr_irqs: 456, preallocated irqs: 16 Jul 10 00:36:55.988540 kernel: random: crng init done Jul 10 00:36:55.988546 kernel: Console: colour VGA+ 80x25 Jul 10 00:36:55.988553 kernel: printk: console [ttyS0] enabled Jul 10 00:36:55.988560 kernel: ACPI: Core revision 20210730 Jul 10 00:36:55.988578 kernel: clocksource: hpet: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 19112604467 ns Jul 10 00:36:55.988585 kernel: APIC: Switch to symmetric I/O mode setup Jul 10 00:36:55.988593 kernel: x2apic enabled Jul 10 00:36:55.988600 kernel: Switched APIC routing to physical x2apic. Jul 10 00:36:55.988609 kernel: kvm-guest: setup PV IPIs Jul 10 00:36:55.988616 kernel: ..TIMER: vector=0x30 apic1=0 pin1=2 apic2=-1 pin2=-1 Jul 10 00:36:55.988623 kernel: tsc: Marking TSC unstable due to TSCs unsynchronized Jul 10 00:36:55.988632 kernel: Calibrating delay loop (skipped) preset value.. 5589.49 BogoMIPS (lpj=2794748) Jul 10 00:36:55.988639 kernel: x86/cpu: User Mode Instruction Prevention (UMIP) activated Jul 10 00:36:55.988646 kernel: Last level iTLB entries: 4KB 512, 2MB 255, 4MB 127 Jul 10 00:36:55.988652 kernel: Last level dTLB entries: 4KB 512, 2MB 255, 4MB 127, 1GB 0 Jul 10 00:36:55.988665 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization Jul 10 00:36:55.988672 kernel: Spectre V2 : Mitigation: Retpolines Jul 10 00:36:55.988680 kernel: Spectre V2 : Spectre v2 / SpectreRSB: Filling RSB on context switch and VMEXIT Jul 10 00:36:55.988688 kernel: Spectre V2 : Enabling Speculation Barrier for firmware calls Jul 10 00:36:55.988695 kernel: RETBleed: Mitigation: untrained return thunk Jul 10 00:36:55.988702 kernel: Spectre V2 : mitigation: Enabling conditional Indirect Branch Prediction Barrier Jul 10 00:36:55.988709 kernel: Speculative Store Bypass: Mitigation: Speculative Store Bypass disabled via prctl and seccomp Jul 10 00:36:55.988716 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' Jul 10 00:36:55.988723 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' Jul 10 00:36:55.988732 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' Jul 10 00:36:55.988739 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 Jul 10 00:36:55.988746 kernel: x86/fpu: Enabled xstate features 0x7, context size is 832 bytes, using 'standard' format. Jul 10 00:36:55.988753 kernel: Freeing SMP alternatives memory: 32K Jul 10 00:36:55.988760 kernel: pid_max: default: 32768 minimum: 301 Jul 10 00:36:55.988767 kernel: LSM: Security Framework initializing Jul 10 00:36:55.988774 kernel: SELinux: Initializing. Jul 10 00:36:55.988781 kernel: Mount-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) Jul 10 00:36:55.988789 kernel: Mountpoint-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) Jul 10 00:36:55.988797 kernel: smpboot: CPU0: AMD EPYC 7402P 24-Core Processor (family: 0x17, model: 0x31, stepping: 0x0) Jul 10 00:36:55.988804 kernel: Performance Events: Fam17h+ core perfctr, AMD PMU driver. Jul 10 00:36:55.988811 kernel: ... version: 0 Jul 10 00:36:55.988818 kernel: ... bit width: 48 Jul 10 00:36:55.988825 kernel: ... generic registers: 6 Jul 10 00:36:55.988832 kernel: ... value mask: 0000ffffffffffff Jul 10 00:36:55.988839 kernel: ... max period: 00007fffffffffff Jul 10 00:36:55.988845 kernel: ... fixed-purpose events: 0 Jul 10 00:36:55.988854 kernel: ... event mask: 000000000000003f Jul 10 00:36:55.988861 kernel: signal: max sigframe size: 1776 Jul 10 00:36:55.988868 kernel: rcu: Hierarchical SRCU implementation. Jul 10 00:36:55.988875 kernel: smp: Bringing up secondary CPUs ... Jul 10 00:36:55.988882 kernel: x86: Booting SMP configuration: Jul 10 00:36:55.988896 kernel: .... node #0, CPUs: #1 Jul 10 00:36:55.988903 kernel: kvm-clock: cpu 1, msr 8819a041, secondary cpu clock Jul 10 00:36:55.988910 kernel: kvm-guest: setup async PF for cpu 1 Jul 10 00:36:55.988917 kernel: kvm-guest: stealtime: cpu 1, msr 9a49c0c0 Jul 10 00:36:55.988926 kernel: #2 Jul 10 00:36:55.988933 kernel: kvm-clock: cpu 2, msr 8819a081, secondary cpu clock Jul 10 00:36:55.988941 kernel: kvm-guest: setup async PF for cpu 2 Jul 10 00:36:55.988948 kernel: kvm-guest: stealtime: cpu 2, msr 9a51c0c0 Jul 10 00:36:55.988955 kernel: #3 Jul 10 00:36:55.988964 kernel: kvm-clock: cpu 3, msr 8819a0c1, secondary cpu clock Jul 10 00:36:55.988971 kernel: kvm-guest: setup async PF for cpu 3 Jul 10 00:36:55.988978 kernel: kvm-guest: stealtime: cpu 3, msr 9a59c0c0 Jul 10 00:36:55.988985 kernel: smp: Brought up 1 node, 4 CPUs Jul 10 00:36:55.988992 kernel: smpboot: Max logical packages: 1 Jul 10 00:36:55.989001 kernel: smpboot: Total of 4 processors activated (22357.98 BogoMIPS) Jul 10 00:36:55.989008 kernel: devtmpfs: initialized Jul 10 00:36:55.989015 kernel: x86/mm: Memory block size: 128MB Jul 10 00:36:55.989022 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Jul 10 00:36:55.989029 kernel: futex hash table entries: 1024 (order: 4, 65536 bytes, linear) Jul 10 00:36:55.989036 kernel: pinctrl core: initialized pinctrl subsystem Jul 10 00:36:55.989043 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Jul 10 00:36:55.989050 kernel: audit: initializing netlink subsys (disabled) Jul 10 00:36:55.989057 kernel: audit: type=2000 audit(1752107816.080:1): state=initialized audit_enabled=0 res=1 Jul 10 00:36:55.989065 kernel: thermal_sys: Registered thermal governor 'step_wise' Jul 10 00:36:55.989072 kernel: thermal_sys: Registered thermal governor 'user_space' Jul 10 00:36:55.989079 kernel: cpuidle: using governor menu Jul 10 00:36:55.989086 kernel: ACPI: bus type PCI registered Jul 10 00:36:55.989093 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Jul 10 00:36:55.989100 kernel: dca service started, version 1.12.1 Jul 10 00:36:55.989108 kernel: PCI: MMCONFIG for domain 0000 [bus 00-ff] at [mem 0xb0000000-0xbfffffff] (base 0xb0000000) Jul 10 00:36:55.989115 kernel: PCI: MMCONFIG at [mem 0xb0000000-0xbfffffff] reserved in E820 Jul 10 00:36:55.989122 kernel: PCI: Using configuration type 1 for base access Jul 10 00:36:55.989130 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. Jul 10 00:36:55.989137 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Jul 10 00:36:55.989144 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Jul 10 00:36:55.989151 kernel: ACPI: Added _OSI(Module Device) Jul 10 00:36:55.989158 kernel: ACPI: Added _OSI(Processor Device) Jul 10 00:36:55.989165 kernel: ACPI: Added _OSI(Processor Aggregator Device) Jul 10 00:36:55.989172 kernel: ACPI: Added _OSI(Linux-Dell-Video) Jul 10 00:36:55.989179 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Jul 10 00:36:55.989186 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Jul 10 00:36:55.989194 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded Jul 10 00:36:55.989201 kernel: ACPI: Interpreter enabled Jul 10 00:36:55.989208 kernel: ACPI: PM: (supports S0 S3 S5) Jul 10 00:36:55.989215 kernel: ACPI: Using IOAPIC for interrupt routing Jul 10 00:36:55.989222 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug Jul 10 00:36:55.989230 kernel: ACPI: Enabled 2 GPEs in block 00 to 3F Jul 10 00:36:55.989237 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff]) Jul 10 00:36:55.989382 kernel: acpi PNP0A08:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI HPX-Type3] Jul 10 00:36:55.989466 kernel: acpi PNP0A08:00: _OSC: platform does not support [PCIeHotplug LTR] Jul 10 00:36:55.989539 kernel: acpi PNP0A08:00: _OSC: OS now controls [PME AER PCIeCapability] Jul 10 00:36:55.989548 kernel: PCI host bridge to bus 0000:00 Jul 10 00:36:55.989653 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] Jul 10 00:36:55.989722 kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] Jul 10 00:36:55.989788 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] Jul 10 00:36:55.989855 kernel: pci_bus 0000:00: root bus resource [mem 0x9d000000-0xafffffff window] Jul 10 00:36:55.989935 kernel: pci_bus 0000:00: root bus resource [mem 0xc0000000-0xfebfffff window] Jul 10 00:36:55.990002 kernel: pci_bus 0000:00: root bus resource [mem 0x100000000-0x8ffffffff window] Jul 10 00:36:55.990113 kernel: pci_bus 0000:00: root bus resource [bus 00-ff] Jul 10 00:36:55.990201 kernel: pci 0000:00:00.0: [8086:29c0] type 00 class 0x060000 Jul 10 00:36:55.990331 kernel: pci 0000:00:01.0: [1234:1111] type 00 class 0x030000 Jul 10 00:36:55.990419 kernel: pci 0000:00:01.0: reg 0x10: [mem 0xfd000000-0xfdffffff pref] Jul 10 00:36:55.990504 kernel: pci 0000:00:01.0: reg 0x18: [mem 0xfebd0000-0xfebd0fff] Jul 10 00:36:55.990652 kernel: pci 0000:00:01.0: reg 0x30: [mem 0xfebc0000-0xfebcffff pref] Jul 10 00:36:55.990731 kernel: pci 0000:00:01.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff] Jul 10 00:36:55.990835 kernel: pci 0000:00:02.0: [1af4:1005] type 00 class 0x00ff00 Jul 10 00:36:55.990928 kernel: pci 0000:00:02.0: reg 0x10: [io 0xc0c0-0xc0df] Jul 10 00:36:55.991017 kernel: pci 0000:00:02.0: reg 0x14: [mem 0xfebd1000-0xfebd1fff] Jul 10 00:36:55.991094 kernel: pci 0000:00:02.0: reg 0x20: [mem 0xfe000000-0xfe003fff 64bit pref] Jul 10 00:36:55.991180 kernel: pci 0000:00:03.0: [1af4:1001] type 00 class 0x010000 Jul 10 00:36:55.991256 kernel: pci 0000:00:03.0: reg 0x10: [io 0xc000-0xc07f] Jul 10 00:36:55.991387 kernel: pci 0000:00:03.0: reg 0x14: [mem 0xfebd2000-0xfebd2fff] Jul 10 00:36:55.991468 kernel: pci 0000:00:03.0: reg 0x20: [mem 0xfe004000-0xfe007fff 64bit pref] Jul 10 00:36:55.991554 kernel: pci 0000:00:04.0: [1af4:1000] type 00 class 0x020000 Jul 10 00:36:55.991649 kernel: pci 0000:00:04.0: reg 0x10: [io 0xc0e0-0xc0ff] Jul 10 00:36:55.991726 kernel: pci 0000:00:04.0: reg 0x14: [mem 0xfebd3000-0xfebd3fff] Jul 10 00:36:55.991810 kernel: pci 0000:00:04.0: reg 0x20: [mem 0xfe008000-0xfe00bfff 64bit pref] Jul 10 00:36:55.991885 kernel: pci 0000:00:04.0: reg 0x30: [mem 0xfeb80000-0xfebbffff pref] Jul 10 00:36:55.991977 kernel: pci 0000:00:1f.0: [8086:2918] type 00 class 0x060100 Jul 10 00:36:55.992052 kernel: pci 0000:00:1f.0: quirk: [io 0x0600-0x067f] claimed by ICH6 ACPI/GPIO/TCO Jul 10 00:36:55.992131 kernel: pci 0000:00:1f.2: [8086:2922] type 00 class 0x010601 Jul 10 00:36:55.992206 kernel: pci 0000:00:1f.2: reg 0x20: [io 0xc100-0xc11f] Jul 10 00:36:55.992279 kernel: pci 0000:00:1f.2: reg 0x24: [mem 0xfebd4000-0xfebd4fff] Jul 10 00:36:55.992362 kernel: pci 0000:00:1f.3: [8086:2930] type 00 class 0x0c0500 Jul 10 00:36:55.992436 kernel: pci 0000:00:1f.3: reg 0x20: [io 0x0700-0x073f] Jul 10 00:36:55.992446 kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 10 Jul 10 00:36:55.992453 kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 10 Jul 10 00:36:55.992460 kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 11 Jul 10 00:36:55.992467 kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 11 Jul 10 00:36:55.992474 kernel: ACPI: PCI: Interrupt link LNKE configured for IRQ 10 Jul 10 00:36:55.992483 kernel: ACPI: PCI: Interrupt link LNKF configured for IRQ 10 Jul 10 00:36:55.992490 kernel: ACPI: PCI: Interrupt link LNKG configured for IRQ 11 Jul 10 00:36:55.992498 kernel: ACPI: PCI: Interrupt link LNKH configured for IRQ 11 Jul 10 00:36:55.992505 kernel: ACPI: PCI: Interrupt link GSIA configured for IRQ 16 Jul 10 00:36:55.992512 kernel: ACPI: PCI: Interrupt link GSIB configured for IRQ 17 Jul 10 00:36:55.992519 kernel: ACPI: PCI: Interrupt link GSIC configured for IRQ 18 Jul 10 00:36:55.992526 kernel: ACPI: PCI: Interrupt link GSID configured for IRQ 19 Jul 10 00:36:55.992533 kernel: ACPI: PCI: Interrupt link GSIE configured for IRQ 20 Jul 10 00:36:55.992540 kernel: ACPI: PCI: Interrupt link GSIF configured for IRQ 21 Jul 10 00:36:55.992548 kernel: ACPI: PCI: Interrupt link GSIG configured for IRQ 22 Jul 10 00:36:55.992555 kernel: ACPI: PCI: Interrupt link GSIH configured for IRQ 23 Jul 10 00:36:55.992574 kernel: iommu: Default domain type: Translated Jul 10 00:36:55.992593 kernel: iommu: DMA domain TLB invalidation policy: lazy mode Jul 10 00:36:55.992680 kernel: pci 0000:00:01.0: vgaarb: setting as boot VGA device Jul 10 00:36:55.992755 kernel: pci 0000:00:01.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none Jul 10 00:36:55.992828 kernel: pci 0000:00:01.0: vgaarb: bridge control possible Jul 10 00:36:55.992838 kernel: vgaarb: loaded Jul 10 00:36:55.992845 kernel: pps_core: LinuxPPS API ver. 1 registered Jul 10 00:36:55.992856 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Jul 10 00:36:55.992863 kernel: PTP clock support registered Jul 10 00:36:55.992870 kernel: PCI: Using ACPI for IRQ routing Jul 10 00:36:55.992877 kernel: PCI: pci_cache_line_size set to 64 bytes Jul 10 00:36:55.992884 kernel: e820: reserve RAM buffer [mem 0x0009fc00-0x0009ffff] Jul 10 00:36:55.992899 kernel: e820: reserve RAM buffer [mem 0x9cfdc000-0x9fffffff] Jul 10 00:36:55.992906 kernel: hpet0: at MMIO 0xfed00000, IRQs 2, 8, 0 Jul 10 00:36:55.992913 kernel: hpet0: 3 comparators, 64-bit 100.000000 MHz counter Jul 10 00:36:55.992920 kernel: clocksource: Switched to clocksource kvm-clock Jul 10 00:36:55.992929 kernel: VFS: Disk quotas dquot_6.6.0 Jul 10 00:36:55.992936 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Jul 10 00:36:55.992944 kernel: pnp: PnP ACPI init Jul 10 00:36:55.993038 kernel: system 00:05: [mem 0xb0000000-0xbfffffff window] has been reserved Jul 10 00:36:55.993048 kernel: pnp: PnP ACPI: found 6 devices Jul 10 00:36:55.993055 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns Jul 10 00:36:55.993062 kernel: NET: Registered PF_INET protocol family Jul 10 00:36:55.993070 kernel: IP idents hash table entries: 65536 (order: 7, 524288 bytes, linear) Jul 10 00:36:55.993080 kernel: tcp_listen_portaddr_hash hash table entries: 2048 (order: 3, 32768 bytes, linear) Jul 10 00:36:55.993087 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Jul 10 00:36:55.993094 kernel: TCP established hash table entries: 32768 (order: 6, 262144 bytes, linear) Jul 10 00:36:55.993101 kernel: TCP bind hash table entries: 32768 (order: 7, 524288 bytes, linear) Jul 10 00:36:55.993108 kernel: TCP: Hash tables configured (established 32768 bind 32768) Jul 10 00:36:55.993115 kernel: UDP hash table entries: 2048 (order: 4, 65536 bytes, linear) Jul 10 00:36:55.993122 kernel: UDP-Lite hash table entries: 2048 (order: 4, 65536 bytes, linear) Jul 10 00:36:55.993129 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Jul 10 00:36:55.993136 kernel: NET: Registered PF_XDP protocol family Jul 10 00:36:55.993207 kernel: pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] Jul 10 00:36:55.993274 kernel: pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] Jul 10 00:36:55.993372 kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window] Jul 10 00:36:55.993439 kernel: pci_bus 0000:00: resource 7 [mem 0x9d000000-0xafffffff window] Jul 10 00:36:55.993519 kernel: pci_bus 0000:00: resource 8 [mem 0xc0000000-0xfebfffff window] Jul 10 00:36:55.993601 kernel: pci_bus 0000:00: resource 9 [mem 0x100000000-0x8ffffffff window] Jul 10 00:36:55.993611 kernel: PCI: CLS 0 bytes, default 64 Jul 10 00:36:55.993619 kernel: Initialise system trusted keyrings Jul 10 00:36:55.993631 kernel: workingset: timestamp_bits=39 max_order=20 bucket_order=0 Jul 10 00:36:55.993639 kernel: Key type asymmetric registered Jul 10 00:36:55.993646 kernel: Asymmetric key parser 'x509' registered Jul 10 00:36:55.993653 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Jul 10 00:36:55.993660 kernel: io scheduler mq-deadline registered Jul 10 00:36:55.993666 kernel: io scheduler kyber registered Jul 10 00:36:55.993674 kernel: io scheduler bfq registered Jul 10 00:36:55.993681 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 Jul 10 00:36:55.993688 kernel: ACPI: \_SB_.GSIG: Enabled at IRQ 22 Jul 10 00:36:55.993697 kernel: ACPI: \_SB_.GSIH: Enabled at IRQ 23 Jul 10 00:36:55.993704 kernel: ACPI: \_SB_.GSIE: Enabled at IRQ 20 Jul 10 00:36:55.993711 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Jul 10 00:36:55.993718 kernel: 00:03: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A Jul 10 00:36:55.993726 kernel: i8042: PNP: PS/2 Controller [PNP0303:KBD,PNP0f13:MOU] at 0x60,0x64 irq 1,12 Jul 10 00:36:55.993733 kernel: serio: i8042 KBD port at 0x60,0x64 irq 1 Jul 10 00:36:55.993739 kernel: serio: i8042 AUX port at 0x60,0x64 irq 12 Jul 10 00:36:55.993746 kernel: input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input0 Jul 10 00:36:55.993826 kernel: rtc_cmos 00:04: RTC can wake from S4 Jul 10 00:36:55.993910 kernel: rtc_cmos 00:04: registered as rtc0 Jul 10 00:36:55.993982 kernel: rtc_cmos 00:04: setting system clock to 2025-07-10T00:36:55 UTC (1752107815) Jul 10 00:36:55.994052 kernel: rtc_cmos 00:04: alarms up to one day, y3k, 242 bytes nvram, hpet irqs Jul 10 00:36:55.994068 kernel: NET: Registered PF_INET6 protocol family Jul 10 00:36:55.994080 kernel: Segment Routing with IPv6 Jul 10 00:36:55.994094 kernel: In-situ OAM (IOAM) with IPv6 Jul 10 00:36:55.994103 kernel: NET: Registered PF_PACKET protocol family Jul 10 00:36:55.994111 kernel: Key type dns_resolver registered Jul 10 00:36:55.994123 kernel: IPI shorthand broadcast: enabled Jul 10 00:36:55.994132 kernel: sched_clock: Marking stable (460460755, 98772825)->(583670571, -24436991) Jul 10 00:36:55.994140 kernel: registered taskstats version 1 Jul 10 00:36:55.994148 kernel: Loading compiled-in X.509 certificates Jul 10 00:36:55.994157 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.186-flatcar: 6ebecdd7757c0df63fc51731f0b99957f4e4af16' Jul 10 00:36:55.994166 kernel: Key type .fscrypt registered Jul 10 00:36:55.994175 kernel: Key type fscrypt-provisioning registered Jul 10 00:36:55.994184 kernel: ima: No TPM chip found, activating TPM-bypass! Jul 10 00:36:55.994193 kernel: ima: Allocated hash algorithm: sha1 Jul 10 00:36:55.994204 kernel: ima: No architecture policies found Jul 10 00:36:55.994212 kernel: clk: Disabling unused clocks Jul 10 00:36:55.994221 kernel: Freeing unused kernel image (initmem) memory: 47472K Jul 10 00:36:55.994231 kernel: Write protecting the kernel read-only data: 28672k Jul 10 00:36:55.994240 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K Jul 10 00:36:55.994249 kernel: Freeing unused kernel image (rodata/data gap) memory: 612K Jul 10 00:36:55.994258 kernel: Run /init as init process Jul 10 00:36:55.994268 kernel: with arguments: Jul 10 00:36:55.994277 kernel: /init Jul 10 00:36:55.994289 kernel: with environment: Jul 10 00:36:55.994298 kernel: HOME=/ Jul 10 00:36:55.994307 kernel: TERM=linux Jul 10 00:36:55.994317 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Jul 10 00:36:55.994329 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Jul 10 00:36:55.994341 systemd[1]: Detected virtualization kvm. Jul 10 00:36:55.994351 systemd[1]: Detected architecture x86-64. Jul 10 00:36:55.994361 systemd[1]: Running in initrd. Jul 10 00:36:55.994373 systemd[1]: No hostname configured, using default hostname. Jul 10 00:36:55.994382 systemd[1]: Hostname set to . Jul 10 00:36:55.994392 systemd[1]: Initializing machine ID from VM UUID. Jul 10 00:36:55.994402 systemd[1]: Queued start job for default target initrd.target. Jul 10 00:36:55.994411 systemd[1]: Started systemd-ask-password-console.path. Jul 10 00:36:55.994421 systemd[1]: Reached target cryptsetup.target. Jul 10 00:36:55.994430 systemd[1]: Reached target paths.target. Jul 10 00:36:55.994440 systemd[1]: Reached target slices.target. Jul 10 00:36:55.994452 systemd[1]: Reached target swap.target. Jul 10 00:36:55.994469 systemd[1]: Reached target timers.target. Jul 10 00:36:55.994479 systemd[1]: Listening on iscsid.socket. Jul 10 00:36:55.994487 systemd[1]: Listening on iscsiuio.socket. Jul 10 00:36:55.994495 systemd[1]: Listening on systemd-journald-audit.socket. Jul 10 00:36:55.994504 systemd[1]: Listening on systemd-journald-dev-log.socket. Jul 10 00:36:55.994512 systemd[1]: Listening on systemd-journald.socket. Jul 10 00:36:55.994519 systemd[1]: Listening on systemd-networkd.socket. Jul 10 00:36:55.994527 systemd[1]: Listening on systemd-udevd-control.socket. Jul 10 00:36:55.994535 systemd[1]: Listening on systemd-udevd-kernel.socket. Jul 10 00:36:55.994543 systemd[1]: Reached target sockets.target. Jul 10 00:36:55.994551 systemd[1]: Starting kmod-static-nodes.service... Jul 10 00:36:55.994558 systemd[1]: Finished network-cleanup.service. Jul 10 00:36:55.994580 systemd[1]: Starting systemd-fsck-usr.service... Jul 10 00:36:55.994590 systemd[1]: Starting systemd-journald.service... Jul 10 00:36:55.994598 systemd[1]: Starting systemd-modules-load.service... Jul 10 00:36:55.994605 systemd[1]: Starting systemd-resolved.service... Jul 10 00:36:55.994613 systemd[1]: Starting systemd-vconsole-setup.service... Jul 10 00:36:55.994621 systemd[1]: Finished kmod-static-nodes.service. Jul 10 00:36:55.994628 systemd[1]: Finished systemd-fsck-usr.service. Jul 10 00:36:55.994637 kernel: audit: type=1130 audit(1752107815.989:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:36:55.994645 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Jul 10 00:36:55.994656 systemd-journald[197]: Journal started Jul 10 00:36:55.994712 systemd-journald[197]: Runtime Journal (/run/log/journal/a744cd0bcaf347a7a4ded074e96a85fd) is 6.0M, max 48.5M, 42.5M free. Jul 10 00:36:55.989000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:36:55.987898 systemd-modules-load[198]: Inserted module 'overlay' Jul 10 00:36:56.039743 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Jul 10 00:36:56.039791 kernel: Bridge firewalling registered Jul 10 00:36:56.039821 systemd[1]: Started systemd-journald.service. Jul 10 00:36:56.005974 systemd-resolved[199]: Positive Trust Anchors: Jul 10 00:36:56.039000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:36:56.005993 systemd-resolved[199]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Jul 10 00:36:56.006021 systemd-resolved[199]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Jul 10 00:36:56.051917 kernel: audit: type=1130 audit(1752107816.039:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:36:56.051980 kernel: audit: type=1130 audit(1752107816.045:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:36:56.045000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:36:56.008343 systemd-resolved[199]: Defaulting to hostname 'linux'. Jul 10 00:36:56.056465 kernel: audit: type=1130 audit(1752107816.054:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:36:56.054000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:36:56.038275 systemd-modules-load[198]: Inserted module 'br_netfilter' Jul 10 00:36:56.061322 kernel: audit: type=1130 audit(1752107816.059:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:36:56.059000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:36:56.040431 systemd[1]: Started systemd-resolved.service. Jul 10 00:36:56.047276 systemd[1]: Finished systemd-vconsole-setup.service. Jul 10 00:36:56.068383 kernel: SCSI subsystem initialized Jul 10 00:36:56.055325 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Jul 10 00:36:56.060095 systemd[1]: Reached target nss-lookup.target. Jul 10 00:36:56.066133 systemd[1]: Starting dracut-cmdline-ask.service... Jul 10 00:36:56.082683 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Jul 10 00:36:56.082771 kernel: device-mapper: uevent: version 1.0.3 Jul 10 00:36:56.082783 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Jul 10 00:36:56.084505 systemd[1]: Finished dracut-cmdline-ask.service. Jul 10 00:36:56.085000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:36:56.087185 systemd[1]: Starting dracut-cmdline.service... Jul 10 00:36:56.090680 kernel: audit: type=1130 audit(1752107816.085:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:36:56.090989 systemd-modules-load[198]: Inserted module 'dm_multipath' Jul 10 00:36:56.092355 systemd[1]: Finished systemd-modules-load.service. Jul 10 00:36:56.094079 systemd[1]: Starting systemd-sysctl.service... Jul 10 00:36:56.098693 kernel: audit: type=1130 audit(1752107816.092:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:36:56.092000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:36:56.098763 dracut-cmdline[215]: dracut-dracut-053 Jul 10 00:36:56.100114 dracut-cmdline[215]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected verity.usrhash=6cddad5f675165861f6062277cc28875548c735477e689762fc73abc16b63a3d Jul 10 00:36:56.104421 systemd[1]: Finished systemd-sysctl.service. Jul 10 00:36:56.105000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:36:56.109606 kernel: audit: type=1130 audit(1752107816.105:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:36:56.162615 kernel: Loading iSCSI transport class v2.0-870. Jul 10 00:36:56.180603 kernel: iscsi: registered transport (tcp) Jul 10 00:36:56.203140 kernel: iscsi: registered transport (qla4xxx) Jul 10 00:36:56.203189 kernel: QLogic iSCSI HBA Driver Jul 10 00:36:56.235290 systemd[1]: Finished dracut-cmdline.service. Jul 10 00:36:56.236000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:36:56.237741 systemd[1]: Starting dracut-pre-udev.service... Jul 10 00:36:56.241810 kernel: audit: type=1130 audit(1752107816.236:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:36:56.284610 kernel: raid6: avx2x4 gen() 29438 MB/s Jul 10 00:36:56.301597 kernel: raid6: avx2x4 xor() 7240 MB/s Jul 10 00:36:56.318593 kernel: raid6: avx2x2 gen() 31850 MB/s Jul 10 00:36:56.335608 kernel: raid6: avx2x2 xor() 18982 MB/s Jul 10 00:36:56.352592 kernel: raid6: avx2x1 gen() 26028 MB/s Jul 10 00:36:56.369596 kernel: raid6: avx2x1 xor() 15046 MB/s Jul 10 00:36:56.386595 kernel: raid6: sse2x4 gen() 14630 MB/s Jul 10 00:36:56.403596 kernel: raid6: sse2x4 xor() 7003 MB/s Jul 10 00:36:56.420602 kernel: raid6: sse2x2 gen() 14595 MB/s Jul 10 00:36:56.437600 kernel: raid6: sse2x2 xor() 9410 MB/s Jul 10 00:36:56.454592 kernel: raid6: sse2x1 gen() 11813 MB/s Jul 10 00:36:56.471947 kernel: raid6: sse2x1 xor() 7749 MB/s Jul 10 00:36:56.471970 kernel: raid6: using algorithm avx2x2 gen() 31850 MB/s Jul 10 00:36:56.471980 kernel: raid6: .... xor() 18982 MB/s, rmw enabled Jul 10 00:36:56.472660 kernel: raid6: using avx2x2 recovery algorithm Jul 10 00:36:56.485587 kernel: xor: automatically using best checksumming function avx Jul 10 00:36:56.581604 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no Jul 10 00:36:56.589537 systemd[1]: Finished dracut-pre-udev.service. Jul 10 00:36:56.589000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:36:56.590000 audit: BPF prog-id=7 op=LOAD Jul 10 00:36:56.590000 audit: BPF prog-id=8 op=LOAD Jul 10 00:36:56.591749 systemd[1]: Starting systemd-udevd.service... Jul 10 00:36:56.604526 systemd-udevd[400]: Using default interface naming scheme 'v252'. Jul 10 00:36:56.609477 systemd[1]: Started systemd-udevd.service. Jul 10 00:36:56.609000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:36:56.612841 systemd[1]: Starting dracut-pre-trigger.service... Jul 10 00:36:56.628330 dracut-pre-trigger[407]: rd.md=0: removing MD RAID activation Jul 10 00:36:56.652944 systemd[1]: Finished dracut-pre-trigger.service. Jul 10 00:36:56.652000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:36:56.654838 systemd[1]: Starting systemd-udev-trigger.service... Jul 10 00:36:56.709651 systemd[1]: Finished systemd-udev-trigger.service. Jul 10 00:36:56.709000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:36:56.752918 kernel: virtio_blk virtio1: [vda] 19775488 512-byte logical blocks (10.1 GB/9.43 GiB) Jul 10 00:36:56.802431 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Jul 10 00:36:56.802451 kernel: GPT:9289727 != 19775487 Jul 10 00:36:56.802460 kernel: GPT:Alternate GPT header not at the end of the disk. Jul 10 00:36:56.802470 kernel: GPT:9289727 != 19775487 Jul 10 00:36:56.802481 kernel: GPT: Use GNU Parted to correct GPT errors. Jul 10 00:36:56.802492 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Jul 10 00:36:56.899611 kernel: cryptd: max_cpu_qlen set to 1000 Jul 10 00:36:56.913546 kernel: AVX2 version of gcm_enc/dec engaged. Jul 10 00:36:56.913610 kernel: AES CTR mode by8 optimization enabled Jul 10 00:36:56.919598 kernel: libata version 3.00 loaded. Jul 10 00:36:56.924585 kernel: BTRFS: device label OEM devid 1 transid 9 /dev/vda6 scanned by (udev-worker) (437) Jul 10 00:36:56.927531 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Jul 10 00:36:56.930484 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Jul 10 00:36:56.936129 kernel: ahci 0000:00:1f.2: version 3.0 Jul 10 00:36:56.950791 kernel: ACPI: \_SB_.GSIA: Enabled at IRQ 16 Jul 10 00:36:56.950811 kernel: ahci 0000:00:1f.2: AHCI 0001.0000 32 slots 6 ports 1.5 Gbps 0x3f impl SATA mode Jul 10 00:36:56.951684 kernel: ahci 0000:00:1f.2: flags: 64bit ncq only Jul 10 00:36:56.951772 kernel: scsi host0: ahci Jul 10 00:36:56.951883 kernel: scsi host1: ahci Jul 10 00:36:56.951975 kernel: scsi host2: ahci Jul 10 00:36:56.952080 kernel: scsi host3: ahci Jul 10 00:36:56.952170 kernel: scsi host4: ahci Jul 10 00:36:56.952257 kernel: scsi host5: ahci Jul 10 00:36:56.952343 kernel: ata1: SATA max UDMA/133 abar m4096@0xfebd4000 port 0xfebd4100 irq 34 Jul 10 00:36:56.952353 kernel: ata2: SATA max UDMA/133 abar m4096@0xfebd4000 port 0xfebd4180 irq 34 Jul 10 00:36:56.952364 kernel: ata3: SATA max UDMA/133 abar m4096@0xfebd4000 port 0xfebd4200 irq 34 Jul 10 00:36:56.952373 kernel: ata4: SATA max UDMA/133 abar m4096@0xfebd4000 port 0xfebd4280 irq 34 Jul 10 00:36:56.952382 kernel: ata5: SATA max UDMA/133 abar m4096@0xfebd4000 port 0xfebd4300 irq 34 Jul 10 00:36:56.952391 kernel: ata6: SATA max UDMA/133 abar m4096@0xfebd4000 port 0xfebd4380 irq 34 Jul 10 00:36:56.943016 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Jul 10 00:36:56.951303 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Jul 10 00:36:56.957410 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Jul 10 00:36:56.960002 systemd[1]: Starting disk-uuid.service... Jul 10 00:36:56.968666 disk-uuid[524]: Primary Header is updated. Jul 10 00:36:56.968666 disk-uuid[524]: Secondary Entries is updated. Jul 10 00:36:56.968666 disk-uuid[524]: Secondary Header is updated. Jul 10 00:36:56.972096 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Jul 10 00:36:56.975583 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Jul 10 00:36:57.256625 kernel: ata2: SATA link down (SStatus 0 SControl 300) Jul 10 00:36:57.264880 kernel: ata5: SATA link down (SStatus 0 SControl 300) Jul 10 00:36:57.264904 kernel: ata1: SATA link down (SStatus 0 SControl 300) Jul 10 00:36:57.265586 kernel: ata6: SATA link down (SStatus 0 SControl 300) Jul 10 00:36:57.266587 kernel: ata4: SATA link down (SStatus 0 SControl 300) Jul 10 00:36:57.267592 kernel: ata3: SATA link up 1.5 Gbps (SStatus 113 SControl 300) Jul 10 00:36:57.269086 kernel: ata3.00: ATAPI: QEMU DVD-ROM, 2.5+, max UDMA/100 Jul 10 00:36:57.269118 kernel: ata3.00: applying bridge limits Jul 10 00:36:57.269753 kernel: ata3.00: configured for UDMA/100 Jul 10 00:36:57.270587 kernel: scsi 2:0:0:0: CD-ROM QEMU QEMU DVD-ROM 2.5+ PQ: 0 ANSI: 5 Jul 10 00:36:57.304587 kernel: sr 2:0:0:0: [sr0] scsi3-mmc drive: 4x/4x cd/rw xa/form2 tray Jul 10 00:36:57.321159 kernel: cdrom: Uniform CD-ROM driver Revision: 3.20 Jul 10 00:36:57.321172 kernel: sr 2:0:0:0: Attached scsi CD-ROM sr0 Jul 10 00:36:57.976586 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Jul 10 00:36:57.976655 disk-uuid[525]: The operation has completed successfully. Jul 10 00:36:58.002734 systemd[1]: disk-uuid.service: Deactivated successfully. Jul 10 00:36:58.004000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:36:58.004000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:36:58.002827 systemd[1]: Finished disk-uuid.service. Jul 10 00:36:58.009419 systemd[1]: Starting verity-setup.service... Jul 10 00:36:58.023598 kernel: device-mapper: verity: sha256 using implementation "sha256-ni" Jul 10 00:36:58.054593 systemd[1]: Found device dev-mapper-usr.device. Jul 10 00:36:58.057878 systemd[1]: Mounting sysusr-usr.mount... Jul 10 00:36:58.060223 systemd[1]: Finished verity-setup.service. Jul 10 00:36:58.061000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:36:58.129593 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Jul 10 00:36:58.129708 systemd[1]: Mounted sysusr-usr.mount. Jul 10 00:36:58.130126 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Jul 10 00:36:58.130857 systemd[1]: Starting ignition-setup.service... Jul 10 00:36:58.132240 systemd[1]: Starting parse-ip-for-networkd.service... Jul 10 00:36:58.142677 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm Jul 10 00:36:58.142720 kernel: BTRFS info (device vda6): using free space tree Jul 10 00:36:58.142742 kernel: BTRFS info (device vda6): has skinny extents Jul 10 00:36:58.151129 systemd[1]: mnt-oem.mount: Deactivated successfully. Jul 10 00:36:58.159000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:36:58.159038 systemd[1]: Finished ignition-setup.service. Jul 10 00:36:58.160855 systemd[1]: Starting ignition-fetch-offline.service... Jul 10 00:36:58.221117 systemd[1]: Finished parse-ip-for-networkd.service. Jul 10 00:36:58.220000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:36:58.265000 audit: BPF prog-id=9 op=LOAD Jul 10 00:36:58.266174 systemd[1]: Starting systemd-networkd.service... Jul 10 00:36:58.294206 systemd-networkd[712]: lo: Link UP Jul 10 00:36:58.294215 systemd-networkd[712]: lo: Gained carrier Jul 10 00:36:58.295000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:36:58.294912 systemd-networkd[712]: Enumeration completed Jul 10 00:36:58.294998 systemd[1]: Started systemd-networkd.service. Jul 10 00:36:58.295286 systemd-networkd[712]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Jul 10 00:36:58.307695 ignition[645]: Ignition 2.14.0 Jul 10 00:36:58.295693 systemd[1]: Reached target network.target. Jul 10 00:36:58.307702 ignition[645]: Stage: fetch-offline Jul 10 00:36:58.296986 systemd-networkd[712]: eth0: Link UP Jul 10 00:36:58.307816 ignition[645]: no configs at "/usr/lib/ignition/base.d" Jul 10 00:36:58.296990 systemd-networkd[712]: eth0: Gained carrier Jul 10 00:36:58.307825 ignition[645]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" Jul 10 00:36:58.297320 systemd[1]: Starting iscsiuio.service... Jul 10 00:36:58.307943 ignition[645]: parsed url from cmdline: "" Jul 10 00:36:58.307946 ignition[645]: no config URL provided Jul 10 00:36:58.307953 ignition[645]: reading system config file "/usr/lib/ignition/user.ign" Jul 10 00:36:58.307959 ignition[645]: no config at "/usr/lib/ignition/user.ign" Jul 10 00:36:58.307977 ignition[645]: op(1): [started] loading QEMU firmware config module Jul 10 00:36:58.307993 ignition[645]: op(1): executing: "modprobe" "qemu_fw_cfg" Jul 10 00:36:58.312209 ignition[645]: op(1): [finished] loading QEMU firmware config module Jul 10 00:36:58.314617 ignition[645]: parsing config with SHA512: 902eab761b9f18a52b6533b695c7ee348e97b7e8fb4861444f0f9561446307b654b94d6a3d7ee291bd6ff188e4abf9eb2d6b83f5de6cd1a9ad5476ac8c7a7d9d Jul 10 00:36:58.327717 unknown[645]: fetched base config from "system" Jul 10 00:36:58.328192 ignition[645]: fetch-offline: fetch-offline passed Jul 10 00:36:58.329000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:36:58.327727 unknown[645]: fetched user config from "qemu" Jul 10 00:36:58.330000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:36:58.328259 ignition[645]: Ignition finished successfully Jul 10 00:36:58.328845 systemd[1]: Started iscsiuio.service. Jul 10 00:36:58.330554 systemd[1]: Finished ignition-fetch-offline.service. Jul 10 00:36:58.331409 systemd[1]: ignition-fetch.service was skipped because of an unmet condition check (ConditionPathExists=!/run/ignition.json). Jul 10 00:36:58.332702 systemd[1]: Starting ignition-kargs.service... Jul 10 00:36:58.334069 systemd[1]: Starting iscsid.service... Jul 10 00:36:58.339395 iscsid[724]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Jul 10 00:36:58.339395 iscsid[724]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Jul 10 00:36:58.339395 iscsid[724]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Jul 10 00:36:58.339395 iscsid[724]: If using hardware iscsi like qla4xxx this message can be ignored. Jul 10 00:36:58.339395 iscsid[724]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Jul 10 00:36:58.339395 iscsid[724]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Jul 10 00:36:58.347000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:36:58.339707 systemd-networkd[712]: eth0: DHCPv4 address 10.0.0.41/16, gateway 10.0.0.1 acquired from 10.0.0.1 Jul 10 00:36:58.342188 systemd[1]: Started iscsid.service. Jul 10 00:36:58.349964 systemd[1]: Starting dracut-initqueue.service... Jul 10 00:36:58.364243 systemd[1]: Finished dracut-initqueue.service. Jul 10 00:36:58.365000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:36:58.365997 systemd[1]: Reached target remote-fs-pre.target. Jul 10 00:36:58.367605 systemd[1]: Reached target remote-cryptsetup.target. Jul 10 00:36:58.369334 systemd[1]: Reached target remote-fs.target. Jul 10 00:36:58.371649 systemd[1]: Starting dracut-pre-mount.service... Jul 10 00:36:58.380374 systemd[1]: Finished dracut-pre-mount.service. Jul 10 00:36:58.380000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:36:58.451183 ignition[723]: Ignition 2.14.0 Jul 10 00:36:58.451198 ignition[723]: Stage: kargs Jul 10 00:36:58.451353 ignition[723]: no configs at "/usr/lib/ignition/base.d" Jul 10 00:36:58.451368 ignition[723]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" Jul 10 00:36:58.452264 ignition[723]: kargs: kargs passed Jul 10 00:36:58.452319 ignition[723]: Ignition finished successfully Jul 10 00:36:58.456449 systemd[1]: Finished ignition-kargs.service. Jul 10 00:36:58.457000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:36:58.458880 systemd[1]: Starting ignition-disks.service... Jul 10 00:36:58.466719 ignition[743]: Ignition 2.14.0 Jul 10 00:36:58.466731 ignition[743]: Stage: disks Jul 10 00:36:58.466867 ignition[743]: no configs at "/usr/lib/ignition/base.d" Jul 10 00:36:58.466880 ignition[743]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" Jul 10 00:36:58.467940 ignition[743]: disks: disks passed Jul 10 00:36:58.467995 ignition[743]: Ignition finished successfully Jul 10 00:36:58.472236 systemd[1]: Finished ignition-disks.service. Jul 10 00:36:58.472630 systemd[1]: Reached target initrd-root-device.target. Jul 10 00:36:58.471000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:36:58.474529 systemd[1]: Reached target local-fs-pre.target. Jul 10 00:36:58.476111 systemd[1]: Reached target local-fs.target. Jul 10 00:36:58.477544 systemd[1]: Reached target sysinit.target. Jul 10 00:36:58.479013 systemd[1]: Reached target basic.target. Jul 10 00:36:58.481250 systemd[1]: Starting systemd-fsck-root.service... Jul 10 00:36:58.494220 systemd-fsck[751]: ROOT: clean, 619/553520 files, 56023/553472 blocks Jul 10 00:36:58.499206 systemd[1]: Finished systemd-fsck-root.service. Jul 10 00:36:58.500000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:36:58.501577 systemd[1]: Mounting sysroot.mount... Jul 10 00:36:58.508587 kernel: EXT4-fs (vda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Jul 10 00:36:58.509106 systemd[1]: Mounted sysroot.mount. Jul 10 00:36:58.509463 systemd[1]: Reached target initrd-root-fs.target. Jul 10 00:36:58.511902 systemd[1]: Mounting sysroot-usr.mount... Jul 10 00:36:58.512510 systemd[1]: flatcar-metadata-hostname.service was skipped because no trigger condition checks were met. Jul 10 00:36:58.512542 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Jul 10 00:36:58.512639 systemd[1]: Reached target ignition-diskful.target. Jul 10 00:36:58.514295 systemd[1]: Mounted sysroot-usr.mount. Jul 10 00:36:58.516203 systemd[1]: Starting initrd-setup-root.service... Jul 10 00:36:58.523916 initrd-setup-root[761]: cut: /sysroot/etc/passwd: No such file or directory Jul 10 00:36:58.528308 initrd-setup-root[769]: cut: /sysroot/etc/group: No such file or directory Jul 10 00:36:58.532434 initrd-setup-root[777]: cut: /sysroot/etc/shadow: No such file or directory Jul 10 00:36:58.535619 initrd-setup-root[785]: cut: /sysroot/etc/gshadow: No such file or directory Jul 10 00:36:58.561577 systemd[1]: Finished initrd-setup-root.service. Jul 10 00:36:58.562000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:36:58.563975 systemd[1]: Starting ignition-mount.service... Jul 10 00:36:58.565426 systemd[1]: Starting sysroot-boot.service... Jul 10 00:36:58.570138 bash[802]: umount: /sysroot/usr/share/oem: not mounted. Jul 10 00:36:58.578091 ignition[803]: INFO : Ignition 2.14.0 Jul 10 00:36:58.578091 ignition[803]: INFO : Stage: mount Jul 10 00:36:58.579652 ignition[803]: INFO : no configs at "/usr/lib/ignition/base.d" Jul 10 00:36:58.579652 ignition[803]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" Jul 10 00:36:58.579652 ignition[803]: INFO : mount: mount passed Jul 10 00:36:58.579652 ignition[803]: INFO : Ignition finished successfully Jul 10 00:36:58.583993 systemd[1]: Finished ignition-mount.service. Jul 10 00:36:58.584000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:36:58.586346 systemd[1]: Finished sysroot-boot.service. Jul 10 00:36:58.586000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:36:59.069183 systemd[1]: Mounting sysroot-usr-share-oem.mount... Jul 10 00:36:59.079270 kernel: BTRFS: device label OEM devid 1 transid 10 /dev/vda6 scanned by mount (813) Jul 10 00:36:59.079298 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm Jul 10 00:36:59.079308 kernel: BTRFS info (device vda6): using free space tree Jul 10 00:36:59.080142 kernel: BTRFS info (device vda6): has skinny extents Jul 10 00:36:59.084408 systemd[1]: Mounted sysroot-usr-share-oem.mount. Jul 10 00:36:59.086251 systemd[1]: Starting ignition-files.service... Jul 10 00:36:59.100943 ignition[833]: INFO : Ignition 2.14.0 Jul 10 00:36:59.100943 ignition[833]: INFO : Stage: files Jul 10 00:36:59.102832 ignition[833]: INFO : no configs at "/usr/lib/ignition/base.d" Jul 10 00:36:59.102832 ignition[833]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" Jul 10 00:36:59.102832 ignition[833]: DEBUG : files: compiled without relabeling support, skipping Jul 10 00:36:59.106402 ignition[833]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Jul 10 00:36:59.106402 ignition[833]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Jul 10 00:36:59.106402 ignition[833]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Jul 10 00:36:59.106402 ignition[833]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Jul 10 00:36:59.106402 ignition[833]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Jul 10 00:36:59.106374 unknown[833]: wrote ssh authorized keys file for user: core Jul 10 00:36:59.114363 ignition[833]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/home/core/install.sh" Jul 10 00:36:59.114363 ignition[833]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/home/core/install.sh" Jul 10 00:36:59.114363 ignition[833]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/etc/flatcar/update.conf" Jul 10 00:36:59.114363 ignition[833]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/etc/flatcar/update.conf" Jul 10 00:36:59.114363 ignition[833]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.32.4-x86-64.raw" Jul 10 00:36:59.114363 ignition[833]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.32.4-x86-64.raw" Jul 10 00:36:59.114363 ignition[833]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.32.4-x86-64.raw" Jul 10 00:36:59.114363 ignition[833]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET https://extensions.flatcar.org/extensions/kubernetes-v1.32.4-x86-64.raw: attempt #1 Jul 10 00:36:59.465764 systemd-networkd[712]: eth0: Gained IPv6LL Jul 10 00:36:59.690359 ignition[833]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET result: OK Jul 10 00:37:00.020144 ignition[833]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.32.4-x86-64.raw" Jul 10 00:37:00.020144 ignition[833]: INFO : files: op(7): [started] processing unit "coreos-metadata.service" Jul 10 00:37:00.024613 ignition[833]: INFO : files: op(7): op(8): [started] writing unit "coreos-metadata.service" at "/sysroot/etc/systemd/system/coreos-metadata.service" Jul 10 00:37:00.024613 ignition[833]: INFO : files: op(7): op(8): [finished] writing unit "coreos-metadata.service" at "/sysroot/etc/systemd/system/coreos-metadata.service" Jul 10 00:37:00.024613 ignition[833]: INFO : files: op(7): [finished] processing unit "coreos-metadata.service" Jul 10 00:37:00.024613 ignition[833]: INFO : files: op(9): [started] setting preset to disabled for "coreos-metadata.service" Jul 10 00:37:00.024613 ignition[833]: INFO : files: op(9): op(a): [started] removing enablement symlink(s) for "coreos-metadata.service" Jul 10 00:37:00.045806 ignition[833]: INFO : files: op(9): op(a): [finished] removing enablement symlink(s) for "coreos-metadata.service" Jul 10 00:37:00.047490 ignition[833]: INFO : files: op(9): [finished] setting preset to disabled for "coreos-metadata.service" Jul 10 00:37:00.048912 ignition[833]: INFO : files: createResultFile: createFiles: op(b): [started] writing file "/sysroot/etc/.ignition-result.json" Jul 10 00:37:00.050674 ignition[833]: INFO : files: createResultFile: createFiles: op(b): [finished] writing file "/sysroot/etc/.ignition-result.json" Jul 10 00:37:00.052331 ignition[833]: INFO : files: files passed Jul 10 00:37:00.053058 ignition[833]: INFO : Ignition finished successfully Jul 10 00:37:00.054727 systemd[1]: Finished ignition-files.service. Jul 10 00:37:00.054000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:37:00.056032 systemd[1]: Starting initrd-setup-root-after-ignition.service... Jul 10 00:37:00.056815 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Jul 10 00:37:00.057428 systemd[1]: Starting ignition-quench.service... Jul 10 00:37:00.060717 systemd[1]: ignition-quench.service: Deactivated successfully. Jul 10 00:37:00.061000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:37:00.061000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:37:00.060820 systemd[1]: Finished ignition-quench.service. Jul 10 00:37:00.064993 initrd-setup-root-after-ignition[858]: grep: /sysroot/usr/share/oem/oem-release: No such file or directory Jul 10 00:37:00.067615 initrd-setup-root-after-ignition[860]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Jul 10 00:37:00.068168 systemd[1]: Finished initrd-setup-root-after-ignition.service. Jul 10 00:37:00.069000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:37:00.070228 systemd[1]: Reached target ignition-complete.target. Jul 10 00:37:00.072649 systemd[1]: Starting initrd-parse-etc.service... Jul 10 00:37:00.083693 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Jul 10 00:37:00.083771 systemd[1]: Finished initrd-parse-etc.service. Jul 10 00:37:00.084000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:37:00.084000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:37:00.085551 systemd[1]: Reached target initrd-fs.target. Jul 10 00:37:00.086989 systemd[1]: Reached target initrd.target. Jul 10 00:37:00.087762 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Jul 10 00:37:00.088358 systemd[1]: Starting dracut-pre-pivot.service... Jul 10 00:37:00.097534 systemd[1]: Finished dracut-pre-pivot.service. Jul 10 00:37:00.098000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:37:00.099718 systemd[1]: Starting initrd-cleanup.service... Jul 10 00:37:00.107835 systemd[1]: Stopped target nss-lookup.target. Jul 10 00:37:00.108822 systemd[1]: Stopped target remote-cryptsetup.target. Jul 10 00:37:00.110363 systemd[1]: Stopped target timers.target. Jul 10 00:37:00.111950 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Jul 10 00:37:00.112000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:37:00.112074 systemd[1]: Stopped dracut-pre-pivot.service. Jul 10 00:37:00.113511 systemd[1]: Stopped target initrd.target. Jul 10 00:37:00.115184 systemd[1]: Stopped target basic.target. Jul 10 00:37:00.117029 systemd[1]: Stopped target ignition-complete.target. Jul 10 00:37:00.119039 systemd[1]: Stopped target ignition-diskful.target. Jul 10 00:37:00.120880 systemd[1]: Stopped target initrd-root-device.target. Jul 10 00:37:00.122719 systemd[1]: Stopped target remote-fs.target. Jul 10 00:37:00.124419 systemd[1]: Stopped target remote-fs-pre.target. Jul 10 00:37:00.126093 systemd[1]: Stopped target sysinit.target. Jul 10 00:37:00.127626 systemd[1]: Stopped target local-fs.target. Jul 10 00:37:00.129204 systemd[1]: Stopped target local-fs-pre.target. Jul 10 00:37:00.130719 systemd[1]: Stopped target swap.target. Jul 10 00:37:00.133000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:37:00.132114 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Jul 10 00:37:00.132258 systemd[1]: Stopped dracut-pre-mount.service. Jul 10 00:37:00.136000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:37:00.133809 systemd[1]: Stopped target cryptsetup.target. Jul 10 00:37:00.137000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:37:00.135149 systemd[1]: dracut-initqueue.service: Deactivated successfully. Jul 10 00:37:00.135269 systemd[1]: Stopped dracut-initqueue.service. Jul 10 00:37:00.136961 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Jul 10 00:37:00.137077 systemd[1]: Stopped ignition-fetch-offline.service. Jul 10 00:37:00.138617 systemd[1]: Stopped target paths.target. Jul 10 00:37:00.139987 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Jul 10 00:37:00.143616 systemd[1]: Stopped systemd-ask-password-console.path. Jul 10 00:37:00.145177 systemd[1]: Stopped target slices.target. Jul 10 00:37:00.146920 systemd[1]: Stopped target sockets.target. Jul 10 00:37:00.155158 kernel: kauditd_printk_skb: 35 callbacks suppressed Jul 10 00:37:00.155179 kernel: audit: type=1131 audit(1752107820.149:46): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:37:00.149000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:37:00.148527 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Jul 10 00:37:00.159672 kernel: audit: type=1131 audit(1752107820.154:47): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:37:00.154000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:37:00.148679 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Jul 10 00:37:00.161332 iscsid[724]: iscsid shutting down. Jul 10 00:37:00.150176 systemd[1]: ignition-files.service: Deactivated successfully. Jul 10 00:37:00.162000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:37:00.150281 systemd[1]: Stopped ignition-files.service. Jul 10 00:37:00.167929 kernel: audit: type=1131 audit(1752107820.162:48): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:37:00.167948 ignition[873]: INFO : Ignition 2.14.0 Jul 10 00:37:00.167948 ignition[873]: INFO : Stage: umount Jul 10 00:37:00.167948 ignition[873]: INFO : no configs at "/usr/lib/ignition/base.d" Jul 10 00:37:00.167948 ignition[873]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" Jul 10 00:37:00.167948 ignition[873]: INFO : umount: umount passed Jul 10 00:37:00.167948 ignition[873]: INFO : Ignition finished successfully Jul 10 00:37:00.184926 kernel: audit: type=1131 audit(1752107820.169:49): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:37:00.184942 kernel: audit: type=1131 audit(1752107820.173:50): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:37:00.184952 kernel: audit: type=1131 audit(1752107820.178:51): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:37:00.169000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:37:00.173000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:37:00.178000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:37:00.156233 systemd[1]: Stopping ignition-mount.service... Jul 10 00:37:00.159917 systemd[1]: Stopping iscsid.service... Jul 10 00:37:00.184000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:37:00.161328 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Jul 10 00:37:00.196596 kernel: audit: type=1131 audit(1752107820.184:52): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:37:00.161496 systemd[1]: Stopped kmod-static-nodes.service. Jul 10 00:37:00.166548 systemd[1]: Stopping sysroot-boot.service... Jul 10 00:37:00.167960 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Jul 10 00:37:00.168107 systemd[1]: Stopped systemd-udev-trigger.service. Jul 10 00:37:00.169847 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Jul 10 00:37:00.169972 systemd[1]: Stopped dracut-pre-trigger.service. Jul 10 00:37:00.176852 systemd[1]: iscsid.service: Deactivated successfully. Jul 10 00:37:00.176959 systemd[1]: Stopped iscsid.service. Jul 10 00:37:00.179172 systemd[1]: ignition-mount.service: Deactivated successfully. Jul 10 00:37:00.179268 systemd[1]: Stopped ignition-mount.service. Jul 10 00:37:00.204649 systemd[1]: sysroot-boot.mount: Deactivated successfully. Jul 10 00:37:00.206041 systemd[1]: iscsid.socket: Deactivated successfully. Jul 10 00:37:00.206883 systemd[1]: Closed iscsid.socket. Jul 10 00:37:00.208104 systemd[1]: ignition-disks.service: Deactivated successfully. Jul 10 00:37:00.208956 systemd[1]: Stopped ignition-disks.service. Jul 10 00:37:00.209000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:37:00.210396 systemd[1]: ignition-kargs.service: Deactivated successfully. Jul 10 00:37:00.214762 kernel: audit: type=1131 audit(1752107820.209:53): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:37:00.214780 kernel: audit: type=1131 audit(1752107820.214:54): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:37:00.214000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:37:00.210428 systemd[1]: Stopped ignition-kargs.service. Jul 10 00:37:00.214792 systemd[1]: ignition-setup.service: Deactivated successfully. Jul 10 00:37:00.222521 kernel: audit: type=1131 audit(1752107820.218:55): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:37:00.218000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:37:00.214828 systemd[1]: Stopped ignition-setup.service. Jul 10 00:37:00.218923 systemd[1]: Stopping iscsiuio.service... Jul 10 00:37:00.223000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:37:00.225000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:37:00.225000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:37:00.223139 systemd[1]: iscsiuio.service: Deactivated successfully. Jul 10 00:37:00.223218 systemd[1]: Stopped iscsiuio.service. Jul 10 00:37:00.224690 systemd[1]: initrd-cleanup.service: Deactivated successfully. Jul 10 00:37:00.224759 systemd[1]: Finished initrd-cleanup.service. Jul 10 00:37:00.226838 systemd[1]: Stopped target network.target. Jul 10 00:37:00.227748 systemd[1]: iscsiuio.socket: Deactivated successfully. Jul 10 00:37:00.227777 systemd[1]: Closed iscsiuio.socket. Jul 10 00:37:00.229172 systemd[1]: Stopping systemd-networkd.service... Jul 10 00:37:00.230852 systemd[1]: Stopping systemd-resolved.service... Jul 10 00:37:00.234640 systemd-networkd[712]: eth0: DHCPv6 lease lost Jul 10 00:37:00.236000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:37:00.235560 systemd[1]: systemd-networkd.service: Deactivated successfully. Jul 10 00:37:00.235663 systemd[1]: Stopped systemd-networkd.service. Jul 10 00:37:00.241000 audit: BPF prog-id=9 op=UNLOAD Jul 10 00:37:00.253000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:37:00.237733 systemd[1]: systemd-networkd.socket: Deactivated successfully. Jul 10 00:37:00.254000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:37:00.256000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:37:00.237769 systemd[1]: Closed systemd-networkd.socket. Jul 10 00:37:00.239595 systemd[1]: Stopping network-cleanup.service... Jul 10 00:37:00.240667 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Jul 10 00:37:00.240715 systemd[1]: Stopped parse-ip-for-networkd.service. Jul 10 00:37:00.260000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:37:00.254217 systemd[1]: systemd-sysctl.service: Deactivated successfully. Jul 10 00:37:00.254253 systemd[1]: Stopped systemd-sysctl.service. Jul 10 00:37:00.255889 systemd[1]: systemd-modules-load.service: Deactivated successfully. Jul 10 00:37:00.255923 systemd[1]: Stopped systemd-modules-load.service. Jul 10 00:37:00.265000 audit: BPF prog-id=6 op=UNLOAD Jul 10 00:37:00.265000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:37:00.256816 systemd[1]: Stopping systemd-udevd.service... Jul 10 00:37:00.259397 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Jul 10 00:37:00.267000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:37:00.259905 systemd[1]: systemd-resolved.service: Deactivated successfully. Jul 10 00:37:00.260006 systemd[1]: Stopped systemd-resolved.service. Jul 10 00:37:00.265118 systemd[1]: network-cleanup.service: Deactivated successfully. Jul 10 00:37:00.273000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:37:00.274000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:37:00.265222 systemd[1]: Stopped network-cleanup.service. Jul 10 00:37:00.266743 systemd[1]: systemd-udevd.service: Deactivated successfully. Jul 10 00:37:00.276000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:37:00.266862 systemd[1]: Stopped systemd-udevd.service. Jul 10 00:37:00.279000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:37:00.268273 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Jul 10 00:37:00.268304 systemd[1]: Closed systemd-udevd-control.socket. Jul 10 00:37:00.270239 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Jul 10 00:37:00.270326 systemd[1]: Closed systemd-udevd-kernel.socket. Jul 10 00:37:00.283000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:37:00.283000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:37:00.272044 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Jul 10 00:37:00.272081 systemd[1]: Stopped dracut-pre-udev.service. Jul 10 00:37:00.273926 systemd[1]: dracut-cmdline.service: Deactivated successfully. Jul 10 00:37:00.273968 systemd[1]: Stopped dracut-cmdline.service. Jul 10 00:37:00.275632 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Jul 10 00:37:00.275666 systemd[1]: Stopped dracut-cmdline-ask.service. Jul 10 00:37:00.277882 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Jul 10 00:37:00.278823 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Jul 10 00:37:00.278876 systemd[1]: Stopped systemd-vconsole-setup.service. Jul 10 00:37:00.283024 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Jul 10 00:37:00.283099 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Jul 10 00:37:00.307371 systemd[1]: sysroot-boot.service: Deactivated successfully. Jul 10 00:37:00.307514 systemd[1]: Stopped sysroot-boot.service. Jul 10 00:37:00.308000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:37:00.309487 systemd[1]: Reached target initrd-switch-root.target. Jul 10 00:37:00.311000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:37:00.311095 systemd[1]: initrd-setup-root.service: Deactivated successfully. Jul 10 00:37:00.311153 systemd[1]: Stopped initrd-setup-root.service. Jul 10 00:37:00.312863 systemd[1]: Starting initrd-switch-root.service... Jul 10 00:37:00.329107 systemd[1]: Switching root. Jul 10 00:37:00.349360 systemd-journald[197]: Journal stopped Jul 10 00:37:04.335955 systemd-journald[197]: Received SIGTERM from PID 1 (systemd). Jul 10 00:37:04.336044 kernel: SELinux: Class mctp_socket not defined in policy. Jul 10 00:37:04.336066 kernel: SELinux: Class anon_inode not defined in policy. Jul 10 00:37:04.336080 kernel: SELinux: the above unknown classes and permissions will be allowed Jul 10 00:37:04.336092 kernel: SELinux: policy capability network_peer_controls=1 Jul 10 00:37:04.336105 kernel: SELinux: policy capability open_perms=1 Jul 10 00:37:04.336115 kernel: SELinux: policy capability extended_socket_class=1 Jul 10 00:37:04.336124 kernel: SELinux: policy capability always_check_network=0 Jul 10 00:37:04.336140 kernel: SELinux: policy capability cgroup_seclabel=1 Jul 10 00:37:04.336152 kernel: SELinux: policy capability nnp_nosuid_transition=1 Jul 10 00:37:04.336166 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Jul 10 00:37:04.336176 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Jul 10 00:37:04.336187 systemd[1]: Successfully loaded SELinux policy in 41.352ms. Jul 10 00:37:04.336204 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 6.841ms. Jul 10 00:37:04.336215 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Jul 10 00:37:04.336226 systemd[1]: Detected virtualization kvm. Jul 10 00:37:04.336237 systemd[1]: Detected architecture x86-64. Jul 10 00:37:04.336250 systemd[1]: Detected first boot. Jul 10 00:37:04.336262 systemd[1]: Initializing machine ID from VM UUID. Jul 10 00:37:04.336274 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). Jul 10 00:37:04.336284 systemd[1]: Populated /etc with preset unit settings. Jul 10 00:37:04.336295 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Jul 10 00:37:04.336317 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Jul 10 00:37:04.336331 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Jul 10 00:37:04.336344 systemd[1]: initrd-switch-root.service: Deactivated successfully. Jul 10 00:37:04.336360 systemd[1]: Stopped initrd-switch-root.service. Jul 10 00:37:04.336372 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Jul 10 00:37:04.336383 systemd[1]: Created slice system-addon\x2dconfig.slice. Jul 10 00:37:04.336394 systemd[1]: Created slice system-addon\x2drun.slice. Jul 10 00:37:04.336404 systemd[1]: Created slice system-getty.slice. Jul 10 00:37:04.336415 systemd[1]: Created slice system-modprobe.slice. Jul 10 00:37:04.336426 systemd[1]: Created slice system-serial\x2dgetty.slice. Jul 10 00:37:04.336438 systemd[1]: Created slice system-system\x2dcloudinit.slice. Jul 10 00:37:04.336451 systemd[1]: Created slice system-systemd\x2dfsck.slice. Jul 10 00:37:04.336462 systemd[1]: Created slice user.slice. Jul 10 00:37:04.336474 systemd[1]: Started systemd-ask-password-console.path. Jul 10 00:37:04.336485 systemd[1]: Started systemd-ask-password-wall.path. Jul 10 00:37:04.336496 systemd[1]: Set up automount boot.automount. Jul 10 00:37:04.336506 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Jul 10 00:37:04.336517 systemd[1]: Stopped target initrd-switch-root.target. Jul 10 00:37:04.336531 systemd[1]: Stopped target initrd-fs.target. Jul 10 00:37:04.336542 systemd[1]: Stopped target initrd-root-fs.target. Jul 10 00:37:04.336553 systemd[1]: Reached target integritysetup.target. Jul 10 00:37:04.336578 systemd[1]: Reached target remote-cryptsetup.target. Jul 10 00:37:04.336589 systemd[1]: Reached target remote-fs.target. Jul 10 00:37:04.336600 systemd[1]: Reached target slices.target. Jul 10 00:37:04.336610 systemd[1]: Reached target swap.target. Jul 10 00:37:04.336621 systemd[1]: Reached target torcx.target. Jul 10 00:37:04.336632 systemd[1]: Reached target veritysetup.target. Jul 10 00:37:04.336650 systemd[1]: Listening on systemd-coredump.socket. Jul 10 00:37:04.336660 systemd[1]: Listening on systemd-initctl.socket. Jul 10 00:37:04.336670 systemd[1]: Listening on systemd-networkd.socket. Jul 10 00:37:04.336691 systemd[1]: Listening on systemd-udevd-control.socket. Jul 10 00:37:04.336702 systemd[1]: Listening on systemd-udevd-kernel.socket. Jul 10 00:37:04.336713 systemd[1]: Listening on systemd-userdbd.socket. Jul 10 00:37:04.336726 systemd[1]: Mounting dev-hugepages.mount... Jul 10 00:37:04.336737 systemd[1]: Mounting dev-mqueue.mount... Jul 10 00:37:04.336747 systemd[1]: Mounting media.mount... Jul 10 00:37:04.336761 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Jul 10 00:37:04.336771 systemd[1]: Mounting sys-kernel-debug.mount... Jul 10 00:37:04.336782 systemd[1]: Mounting sys-kernel-tracing.mount... Jul 10 00:37:04.336792 systemd[1]: Mounting tmp.mount... Jul 10 00:37:04.336802 systemd[1]: Starting flatcar-tmpfiles.service... Jul 10 00:37:04.336816 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Jul 10 00:37:04.336829 systemd[1]: Starting kmod-static-nodes.service... Jul 10 00:37:04.336839 systemd[1]: Starting modprobe@configfs.service... Jul 10 00:37:04.336850 systemd[1]: Starting modprobe@dm_mod.service... Jul 10 00:37:04.336865 systemd[1]: Starting modprobe@drm.service... Jul 10 00:37:04.336875 systemd[1]: Starting modprobe@efi_pstore.service... Jul 10 00:37:04.336886 systemd[1]: Starting modprobe@fuse.service... Jul 10 00:37:04.336897 systemd[1]: Starting modprobe@loop.service... Jul 10 00:37:04.336908 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Jul 10 00:37:04.336919 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Jul 10 00:37:04.336929 systemd[1]: Stopped systemd-fsck-root.service. Jul 10 00:37:04.336940 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Jul 10 00:37:04.336950 kernel: loop: module loaded Jul 10 00:37:04.336965 systemd[1]: Stopped systemd-fsck-usr.service. Jul 10 00:37:04.336976 systemd[1]: Stopped systemd-journald.service. Jul 10 00:37:04.336986 kernel: fuse: init (API version 7.34) Jul 10 00:37:04.336996 systemd[1]: Starting systemd-journald.service... Jul 10 00:37:04.337007 systemd[1]: Starting systemd-modules-load.service... Jul 10 00:37:04.337017 systemd[1]: Starting systemd-network-generator.service... Jul 10 00:37:04.337028 systemd[1]: Starting systemd-remount-fs.service... Jul 10 00:37:04.337039 systemd[1]: Starting systemd-udev-trigger.service... Jul 10 00:37:04.337049 systemd[1]: verity-setup.service: Deactivated successfully. Jul 10 00:37:04.337062 systemd[1]: Stopped verity-setup.service. Jul 10 00:37:04.337073 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Jul 10 00:37:04.337083 systemd[1]: Mounted dev-hugepages.mount. Jul 10 00:37:04.337096 systemd-journald[987]: Journal started Jul 10 00:37:04.337136 systemd-journald[987]: Runtime Journal (/run/log/journal/a744cd0bcaf347a7a4ded074e96a85fd) is 6.0M, max 48.5M, 42.5M free. Jul 10 00:37:00.415000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Jul 10 00:37:00.736000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Jul 10 00:37:00.736000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Jul 10 00:37:00.737000 audit: BPF prog-id=10 op=LOAD Jul 10 00:37:00.737000 audit: BPF prog-id=10 op=UNLOAD Jul 10 00:37:00.737000 audit: BPF prog-id=11 op=LOAD Jul 10 00:37:00.737000 audit: BPF prog-id=11 op=UNLOAD Jul 10 00:37:00.766000 audit[907]: AVC avc: denied { associate } for pid=907 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Jul 10 00:37:00.766000 audit[907]: SYSCALL arch=c000003e syscall=188 success=yes exit=0 a0=c0001858cc a1=c00002ae40 a2=c000029100 a3=32 items=0 ppid=890 pid=907 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:37:00.766000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Jul 10 00:37:00.768000 audit[907]: AVC avc: denied { associate } for pid=907 comm="torcx-generator" name="lib" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Jul 10 00:37:00.768000 audit[907]: SYSCALL arch=c000003e syscall=258 success=yes exit=0 a0=ffffffffffffff9c a1=c0001859a5 a2=1ed a3=0 items=2 ppid=890 pid=907 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:37:00.768000 audit: CWD cwd="/" Jul 10 00:37:00.768000 audit: PATH item=0 name=(null) inode=2 dev=00:1b mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:37:00.768000 audit: PATH item=1 name=(null) inode=3 dev=00:1b mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:37:00.768000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Jul 10 00:37:04.198000 audit: BPF prog-id=12 op=LOAD Jul 10 00:37:04.198000 audit: BPF prog-id=3 op=UNLOAD Jul 10 00:37:04.198000 audit: BPF prog-id=13 op=LOAD Jul 10 00:37:04.199000 audit: BPF prog-id=14 op=LOAD Jul 10 00:37:04.199000 audit: BPF prog-id=4 op=UNLOAD Jul 10 00:37:04.199000 audit: BPF prog-id=5 op=UNLOAD Jul 10 00:37:04.199000 audit: BPF prog-id=15 op=LOAD Jul 10 00:37:04.199000 audit: BPF prog-id=12 op=UNLOAD Jul 10 00:37:04.199000 audit: BPF prog-id=16 op=LOAD Jul 10 00:37:04.199000 audit: BPF prog-id=17 op=LOAD Jul 10 00:37:04.199000 audit: BPF prog-id=13 op=UNLOAD Jul 10 00:37:04.199000 audit: BPF prog-id=14 op=UNLOAD Jul 10 00:37:04.200000 audit: BPF prog-id=18 op=LOAD Jul 10 00:37:04.200000 audit: BPF prog-id=15 op=UNLOAD Jul 10 00:37:04.200000 audit: BPF prog-id=19 op=LOAD Jul 10 00:37:04.200000 audit: BPF prog-id=20 op=LOAD Jul 10 00:37:04.200000 audit: BPF prog-id=16 op=UNLOAD Jul 10 00:37:04.200000 audit: BPF prog-id=17 op=UNLOAD Jul 10 00:37:04.201000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:37:04.208000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:37:04.208000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:37:04.212000 audit: BPF prog-id=18 op=UNLOAD Jul 10 00:37:04.306000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:37:04.309000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:37:04.312000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:37:04.312000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:37:04.312000 audit: BPF prog-id=21 op=LOAD Jul 10 00:37:04.313000 audit: BPF prog-id=22 op=LOAD Jul 10 00:37:04.313000 audit: BPF prog-id=23 op=LOAD Jul 10 00:37:04.313000 audit: BPF prog-id=19 op=UNLOAD Jul 10 00:37:04.313000 audit: BPF prog-id=20 op=UNLOAD Jul 10 00:37:04.332000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:37:04.334000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Jul 10 00:37:04.334000 audit[987]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=3 a1=7ffc59bdad60 a2=4000 a3=7ffc59bdadfc items=0 ppid=1 pid=987 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:37:04.334000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Jul 10 00:37:04.197256 systemd[1]: Queued start job for default target multi-user.target. Jul 10 00:37:00.765446 /usr/lib/systemd/system-generators/torcx-generator[907]: time="2025-07-10T00:37:00Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" Jul 10 00:37:04.197268 systemd[1]: Unnecessary job was removed for dev-vda6.device. Jul 10 00:37:00.765729 /usr/lib/systemd/system-generators/torcx-generator[907]: time="2025-07-10T00:37:00Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Jul 10 00:37:04.338673 systemd[1]: Started systemd-journald.service. Jul 10 00:37:04.201407 systemd[1]: systemd-journald.service: Deactivated successfully. Jul 10 00:37:00.765752 /usr/lib/systemd/system-generators/torcx-generator[907]: time="2025-07-10T00:37:00Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Jul 10 00:37:00.765796 /usr/lib/systemd/system-generators/torcx-generator[907]: time="2025-07-10T00:37:00Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Jul 10 00:37:00.765806 /usr/lib/systemd/system-generators/torcx-generator[907]: time="2025-07-10T00:37:00Z" level=debug msg="skipped missing lower profile" missing profile=oem Jul 10 00:37:00.765839 /usr/lib/systemd/system-generators/torcx-generator[907]: time="2025-07-10T00:37:00Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Jul 10 00:37:00.765851 /usr/lib/systemd/system-generators/torcx-generator[907]: time="2025-07-10T00:37:00Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Jul 10 00:37:00.766048 /usr/lib/systemd/system-generators/torcx-generator[907]: time="2025-07-10T00:37:00Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Jul 10 00:37:00.766085 /usr/lib/systemd/system-generators/torcx-generator[907]: time="2025-07-10T00:37:00Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Jul 10 00:37:00.766097 /usr/lib/systemd/system-generators/torcx-generator[907]: time="2025-07-10T00:37:00Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Jul 10 00:37:04.338000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:37:00.766600 /usr/lib/systemd/system-generators/torcx-generator[907]: time="2025-07-10T00:37:00Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Jul 10 00:37:00.766634 /usr/lib/systemd/system-generators/torcx-generator[907]: time="2025-07-10T00:37:00Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Jul 10 00:37:00.766650 /usr/lib/systemd/system-generators/torcx-generator[907]: time="2025-07-10T00:37:00Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.7: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.7 Jul 10 00:37:04.339556 systemd[1]: Mounted dev-mqueue.mount. Jul 10 00:37:00.766663 /usr/lib/systemd/system-generators/torcx-generator[907]: time="2025-07-10T00:37:00Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Jul 10 00:37:00.766678 /usr/lib/systemd/system-generators/torcx-generator[907]: time="2025-07-10T00:37:00Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.7: no such file or directory" path=/var/lib/torcx/store/3510.3.7 Jul 10 00:37:00.766691 /usr/lib/systemd/system-generators/torcx-generator[907]: time="2025-07-10T00:37:00Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Jul 10 00:37:03.822866 /usr/lib/systemd/system-generators/torcx-generator[907]: time="2025-07-10T00:37:03Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Jul 10 00:37:03.823215 /usr/lib/systemd/system-generators/torcx-generator[907]: time="2025-07-10T00:37:03Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Jul 10 00:37:03.823333 /usr/lib/systemd/system-generators/torcx-generator[907]: time="2025-07-10T00:37:03Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Jul 10 00:37:03.823516 /usr/lib/systemd/system-generators/torcx-generator[907]: time="2025-07-10T00:37:03Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Jul 10 00:37:03.823583 /usr/lib/systemd/system-generators/torcx-generator[907]: time="2025-07-10T00:37:03Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Jul 10 00:37:03.823663 /usr/lib/systemd/system-generators/torcx-generator[907]: time="2025-07-10T00:37:03Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Jul 10 00:37:04.340487 systemd[1]: Mounted media.mount. Jul 10 00:37:04.341233 systemd[1]: Mounted sys-kernel-debug.mount. Jul 10 00:37:04.342084 systemd[1]: Mounted sys-kernel-tracing.mount. Jul 10 00:37:04.342952 systemd[1]: Mounted tmp.mount. Jul 10 00:37:04.343900 systemd[1]: Finished flatcar-tmpfiles.service. Jul 10 00:37:04.344000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:37:04.345002 systemd[1]: Finished kmod-static-nodes.service. Jul 10 00:37:04.345000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:37:04.346031 systemd[1]: modprobe@configfs.service: Deactivated successfully. Jul 10 00:37:04.346217 systemd[1]: Finished modprobe@configfs.service. Jul 10 00:37:04.346000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:37:04.346000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:37:04.347268 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Jul 10 00:37:04.347400 systemd[1]: Finished modprobe@dm_mod.service. Jul 10 00:37:04.347000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:37:04.347000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:37:04.348445 systemd[1]: modprobe@drm.service: Deactivated successfully. Jul 10 00:37:04.348633 systemd[1]: Finished modprobe@drm.service. Jul 10 00:37:04.348000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:37:04.348000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:37:04.349775 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Jul 10 00:37:04.349943 systemd[1]: Finished modprobe@efi_pstore.service. Jul 10 00:37:04.350000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:37:04.350000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:37:04.351194 systemd[1]: modprobe@fuse.service: Deactivated successfully. Jul 10 00:37:04.351349 systemd[1]: Finished modprobe@fuse.service. Jul 10 00:37:04.351000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:37:04.351000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:37:04.352355 systemd[1]: modprobe@loop.service: Deactivated successfully. Jul 10 00:37:04.352494 systemd[1]: Finished modprobe@loop.service. Jul 10 00:37:04.352000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:37:04.352000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:37:04.353607 systemd[1]: Finished systemd-modules-load.service. Jul 10 00:37:04.353000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:37:04.354766 systemd[1]: Finished systemd-network-generator.service. Jul 10 00:37:04.355000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:37:04.356183 systemd[1]: Finished systemd-remount-fs.service. Jul 10 00:37:04.356000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:37:04.357550 systemd[1]: Reached target network-pre.target. Jul 10 00:37:04.359894 systemd[1]: Mounting sys-fs-fuse-connections.mount... Jul 10 00:37:04.361790 systemd[1]: Mounting sys-kernel-config.mount... Jul 10 00:37:04.362752 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Jul 10 00:37:04.364885 systemd[1]: Starting systemd-hwdb-update.service... Jul 10 00:37:04.367065 systemd[1]: Starting systemd-journal-flush.service... Jul 10 00:37:04.368076 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Jul 10 00:37:04.369076 systemd[1]: Starting systemd-random-seed.service... Jul 10 00:37:04.369978 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Jul 10 00:37:04.370981 systemd[1]: Starting systemd-sysctl.service... Jul 10 00:37:04.372849 systemd[1]: Starting systemd-sysusers.service... Jul 10 00:37:04.441696 systemd[1]: Mounted sys-fs-fuse-connections.mount. Jul 10 00:37:04.443029 systemd[1]: Mounted sys-kernel-config.mount. Jul 10 00:37:04.458972 systemd[1]: Finished systemd-udev-trigger.service. Jul 10 00:37:04.478000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:37:04.479655 systemd-journald[987]: Time spent on flushing to /var/log/journal/a744cd0bcaf347a7a4ded074e96a85fd is 15.977ms for 1090 entries. Jul 10 00:37:04.479655 systemd-journald[987]: System Journal (/var/log/journal/a744cd0bcaf347a7a4ded074e96a85fd) is 8.0M, max 195.6M, 187.6M free. Jul 10 00:37:04.801470 systemd-journald[987]: Received client request to flush runtime journal. Jul 10 00:37:04.629000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:37:04.630000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:37:04.649000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:37:04.613880 systemd[1]: Starting systemd-udev-settle.service... Jul 10 00:37:04.802035 udevadm[1009]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation.service, lvm2-activation-early.service not to pull it in. Jul 10 00:37:04.629006 systemd[1]: Finished systemd-sysusers.service. Jul 10 00:37:04.630319 systemd[1]: Finished systemd-sysctl.service. Jul 10 00:37:04.649484 systemd[1]: Finished systemd-random-seed.service. Jul 10 00:37:04.650437 systemd[1]: Reached target first-boot-complete.target. Jul 10 00:37:04.802645 systemd[1]: Finished systemd-journal-flush.service. Jul 10 00:37:04.803000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:37:05.355387 systemd[1]: Finished systemd-hwdb-update.service. Jul 10 00:37:05.355000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:37:05.357232 kernel: kauditd_printk_skb: 94 callbacks suppressed Jul 10 00:37:05.357305 kernel: audit: type=1130 audit(1752107825.355:141): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:37:05.356000 audit: BPF prog-id=24 op=LOAD Jul 10 00:37:05.361022 systemd[1]: Starting systemd-udevd.service... Jul 10 00:37:05.361256 kernel: audit: type=1334 audit(1752107825.356:142): prog-id=24 op=LOAD Jul 10 00:37:05.361285 kernel: audit: type=1334 audit(1752107825.359:143): prog-id=25 op=LOAD Jul 10 00:37:05.361304 kernel: audit: type=1334 audit(1752107825.359:144): prog-id=7 op=UNLOAD Jul 10 00:37:05.361323 kernel: audit: type=1334 audit(1752107825.359:145): prog-id=8 op=UNLOAD Jul 10 00:37:05.359000 audit: BPF prog-id=25 op=LOAD Jul 10 00:37:05.359000 audit: BPF prog-id=7 op=UNLOAD Jul 10 00:37:05.359000 audit: BPF prog-id=8 op=UNLOAD Jul 10 00:37:05.381926 systemd-udevd[1013]: Using default interface naming scheme 'v252'. Jul 10 00:37:05.396344 systemd[1]: Started systemd-udevd.service. Jul 10 00:37:05.413000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:37:05.416000 audit: BPF prog-id=26 op=LOAD Jul 10 00:37:05.417684 systemd[1]: Starting systemd-networkd.service... Jul 10 00:37:05.418279 kernel: audit: type=1130 audit(1752107825.413:146): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:37:05.418332 kernel: audit: type=1334 audit(1752107825.416:147): prog-id=26 op=LOAD Jul 10 00:37:05.423000 audit: BPF prog-id=27 op=LOAD Jul 10 00:37:05.424000 audit: BPF prog-id=28 op=LOAD Jul 10 00:37:05.425893 kernel: audit: type=1334 audit(1752107825.423:148): prog-id=27 op=LOAD Jul 10 00:37:05.425946 kernel: audit: type=1334 audit(1752107825.424:149): prog-id=28 op=LOAD Jul 10 00:37:05.425965 kernel: audit: type=1334 audit(1752107825.425:150): prog-id=29 op=LOAD Jul 10 00:37:05.425000 audit: BPF prog-id=29 op=LOAD Jul 10 00:37:05.426464 systemd[1]: Starting systemd-userdbd.service... Jul 10 00:37:05.435679 systemd[1]: Condition check resulted in dev-ttyS0.device being skipped. Jul 10 00:37:05.458503 systemd[1]: Started systemd-userdbd.service. Jul 10 00:37:05.465000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:37:05.467276 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Jul 10 00:37:05.476606 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input2 Jul 10 00:37:05.480599 kernel: ACPI: button: Power Button [PWRF] Jul 10 00:37:05.494000 audit[1033]: AVC avc: denied { confidentiality } for pid=1033 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Jul 10 00:37:05.494000 audit[1033]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55925843f360 a1=338ac a2=7fe108310bc5 a3=5 items=110 ppid=1013 pid=1033 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:37:05.494000 audit: CWD cwd="/" Jul 10 00:37:05.494000 audit: PATH item=0 name=(null) inode=1041 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:37:05.494000 audit: PATH item=1 name=(null) inode=14275 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:37:05.494000 audit: PATH item=2 name=(null) inode=14275 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:37:05.494000 audit: PATH item=3 name=(null) inode=14276 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:37:05.494000 audit: PATH item=4 name=(null) inode=14275 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:37:05.494000 audit: PATH item=5 name=(null) inode=14277 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:37:05.494000 audit: PATH item=6 name=(null) inode=14275 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:37:05.494000 audit: PATH item=7 name=(null) inode=14278 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:37:05.494000 audit: PATH item=8 name=(null) inode=14278 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:37:05.494000 audit: PATH item=9 name=(null) inode=14279 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:37:05.494000 audit: PATH item=10 name=(null) inode=14278 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:37:05.494000 audit: PATH item=11 name=(null) inode=14280 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:37:05.494000 audit: PATH item=12 name=(null) inode=14278 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:37:05.494000 audit: PATH item=13 name=(null) inode=14281 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:37:05.494000 audit: PATH item=14 name=(null) inode=14278 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:37:05.494000 audit: PATH item=15 name=(null) inode=14282 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:37:05.494000 audit: PATH item=16 name=(null) inode=14278 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:37:05.494000 audit: PATH item=17 name=(null) inode=14283 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:37:05.494000 audit: PATH item=18 name=(null) inode=14275 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:37:05.494000 audit: PATH item=19 name=(null) inode=14284 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:37:05.494000 audit: PATH item=20 name=(null) inode=14284 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:37:05.494000 audit: PATH item=21 name=(null) inode=14285 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:37:05.494000 audit: PATH item=22 name=(null) inode=14284 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:37:05.494000 audit: PATH item=23 name=(null) inode=14286 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:37:05.494000 audit: PATH item=24 name=(null) inode=14284 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:37:05.494000 audit: PATH item=25 name=(null) inode=14287 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:37:05.494000 audit: PATH item=26 name=(null) inode=14284 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:37:05.494000 audit: PATH item=27 name=(null) inode=14288 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:37:05.494000 audit: PATH item=28 name=(null) inode=14284 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:37:05.494000 audit: PATH item=29 name=(null) inode=14289 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:37:05.494000 audit: PATH item=30 name=(null) inode=14275 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:37:05.494000 audit: PATH item=31 name=(null) inode=14290 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:37:05.494000 audit: PATH item=32 name=(null) inode=14290 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:37:05.494000 audit: PATH item=33 name=(null) inode=14291 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:37:05.494000 audit: PATH item=34 name=(null) inode=14290 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:37:05.494000 audit: PATH item=35 name=(null) inode=14292 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:37:05.494000 audit: PATH item=36 name=(null) inode=14290 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:37:05.494000 audit: PATH item=37 name=(null) inode=14293 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:37:05.494000 audit: PATH item=38 name=(null) inode=14290 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:37:05.494000 audit: PATH item=39 name=(null) inode=14294 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:37:05.494000 audit: PATH item=40 name=(null) inode=14290 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:37:05.494000 audit: PATH item=41 name=(null) inode=14295 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:37:05.494000 audit: PATH item=42 name=(null) inode=14275 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:37:05.494000 audit: PATH item=43 name=(null) inode=14296 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:37:05.494000 audit: PATH item=44 name=(null) inode=14296 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:37:05.494000 audit: PATH item=45 name=(null) inode=14297 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:37:05.494000 audit: PATH item=46 name=(null) inode=14296 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:37:05.494000 audit: PATH item=47 name=(null) inode=14298 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:37:05.494000 audit: PATH item=48 name=(null) inode=14296 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:37:05.494000 audit: PATH item=49 name=(null) inode=14299 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:37:05.494000 audit: PATH item=50 name=(null) inode=14296 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:37:05.494000 audit: PATH item=51 name=(null) inode=14300 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:37:05.494000 audit: PATH item=52 name=(null) inode=14296 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:37:05.494000 audit: PATH item=53 name=(null) inode=14301 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:37:05.494000 audit: PATH item=54 name=(null) inode=1041 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:37:05.494000 audit: PATH item=55 name=(null) inode=14302 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:37:05.494000 audit: PATH item=56 name=(null) inode=14302 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:37:05.494000 audit: PATH item=57 name=(null) inode=14303 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:37:05.494000 audit: PATH item=58 name=(null) inode=14302 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:37:05.494000 audit: PATH item=59 name=(null) inode=14304 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:37:05.494000 audit: PATH item=60 name=(null) inode=14302 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:37:05.494000 audit: PATH item=61 name=(null) inode=14305 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:37:05.494000 audit: PATH item=62 name=(null) inode=14305 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:37:05.494000 audit: PATH item=63 name=(null) inode=14306 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:37:05.494000 audit: PATH item=64 name=(null) inode=14305 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:37:05.494000 audit: PATH item=65 name=(null) inode=14307 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:37:05.494000 audit: PATH item=66 name=(null) inode=14305 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:37:05.494000 audit: PATH item=67 name=(null) inode=14308 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:37:05.494000 audit: PATH item=68 name=(null) inode=14305 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:37:05.494000 audit: PATH item=69 name=(null) inode=14309 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:37:05.494000 audit: PATH item=70 name=(null) inode=14305 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:37:05.494000 audit: PATH item=71 name=(null) inode=14310 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:37:05.494000 audit: PATH item=72 name=(null) inode=14302 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:37:05.494000 audit: PATH item=73 name=(null) inode=14311 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:37:05.494000 audit: PATH item=74 name=(null) inode=14311 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:37:05.494000 audit: PATH item=75 name=(null) inode=14312 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:37:05.494000 audit: PATH item=76 name=(null) inode=14311 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:37:05.494000 audit: PATH item=77 name=(null) inode=14313 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:37:05.494000 audit: PATH item=78 name=(null) inode=14311 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:37:05.494000 audit: PATH item=79 name=(null) inode=14314 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:37:05.494000 audit: PATH item=80 name=(null) inode=14311 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:37:05.494000 audit: PATH item=81 name=(null) inode=14315 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:37:05.494000 audit: PATH item=82 name=(null) inode=14311 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:37:05.494000 audit: PATH item=83 name=(null) inode=14316 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:37:05.494000 audit: PATH item=84 name=(null) inode=14302 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:37:05.494000 audit: PATH item=85 name=(null) inode=14317 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:37:05.494000 audit: PATH item=86 name=(null) inode=14317 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:37:05.494000 audit: PATH item=87 name=(null) inode=14318 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:37:05.494000 audit: PATH item=88 name=(null) inode=14317 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:37:05.494000 audit: PATH item=89 name=(null) inode=14319 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:37:05.494000 audit: PATH item=90 name=(null) inode=14317 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:37:05.494000 audit: PATH item=91 name=(null) inode=14320 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:37:05.494000 audit: PATH item=92 name=(null) inode=14317 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:37:05.494000 audit: PATH item=93 name=(null) inode=14321 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:37:05.494000 audit: PATH item=94 name=(null) inode=14317 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:37:05.494000 audit: PATH item=95 name=(null) inode=14322 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:37:05.494000 audit: PATH item=96 name=(null) inode=14302 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:37:05.494000 audit: PATH item=97 name=(null) inode=14323 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:37:05.494000 audit: PATH item=98 name=(null) inode=14323 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:37:05.494000 audit: PATH item=99 name=(null) inode=14324 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:37:05.494000 audit: PATH item=100 name=(null) inode=14323 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:37:05.494000 audit: PATH item=101 name=(null) inode=14325 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:37:05.494000 audit: PATH item=102 name=(null) inode=14323 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:37:05.494000 audit: PATH item=103 name=(null) inode=14326 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:37:05.494000 audit: PATH item=104 name=(null) inode=14323 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:37:05.494000 audit: PATH item=105 name=(null) inode=14327 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:37:05.494000 audit: PATH item=106 name=(null) inode=14323 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:37:05.494000 audit: PATH item=107 name=(null) inode=14328 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:37:05.494000 audit: PATH item=108 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:37:05.494000 audit: PATH item=109 name=(null) inode=14329 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:37:05.494000 audit: PROCTITLE proctitle="(udev-worker)" Jul 10 00:37:05.532339 kernel: i801_smbus 0000:00:1f.3: SMBus using PCI interrupt Jul 10 00:37:05.551225 kernel: i2c i2c-0: 1/1 memory slots populated (from DMI) Jul 10 00:37:05.551435 kernel: i2c i2c-0: Memory type 0x07 not supported yet, not instantiating SPD Jul 10 00:37:05.541355 systemd-networkd[1022]: lo: Link UP Jul 10 00:37:05.541359 systemd-networkd[1022]: lo: Gained carrier Jul 10 00:37:05.542038 systemd-networkd[1022]: Enumeration completed Jul 10 00:37:05.542200 systemd[1]: Started systemd-networkd.service. Jul 10 00:37:05.559379 systemd-networkd[1022]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Jul 10 00:37:05.559000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:37:05.561160 systemd-networkd[1022]: eth0: Link UP Jul 10 00:37:05.561172 systemd-networkd[1022]: eth0: Gained carrier Jul 10 00:37:05.643597 kernel: input: ImExPS/2 Generic Explorer Mouse as /devices/platform/i8042/serio1/input/input3 Jul 10 00:37:05.649630 kernel: mousedev: PS/2 mouse device common for all mice Jul 10 00:37:05.712048 systemd-networkd[1022]: eth0: DHCPv4 address 10.0.0.41/16, gateway 10.0.0.1 acquired from 10.0.0.1 Jul 10 00:37:05.716156 kernel: kvm: Nested Virtualization enabled Jul 10 00:37:05.716230 kernel: SVM: kvm: Nested Paging enabled Jul 10 00:37:05.716256 kernel: SVM: Virtual VMLOAD VMSAVE supported Jul 10 00:37:05.717596 kernel: SVM: Virtual GIF supported Jul 10 00:37:05.742597 kernel: EDAC MC: Ver: 3.0.0 Jul 10 00:37:05.771156 systemd[1]: Finished systemd-udev-settle.service. Jul 10 00:37:05.771000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:37:05.773888 systemd[1]: Starting lvm2-activation-early.service... Jul 10 00:37:05.785366 lvm[1048]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Jul 10 00:37:05.814773 systemd[1]: Finished lvm2-activation-early.service. Jul 10 00:37:05.815000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:37:05.816165 systemd[1]: Reached target cryptsetup.target. Jul 10 00:37:05.818541 systemd[1]: Starting lvm2-activation.service... Jul 10 00:37:05.855983 lvm[1049]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Jul 10 00:37:05.881519 systemd[1]: Finished lvm2-activation.service. Jul 10 00:37:05.881000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:37:05.882562 systemd[1]: Reached target local-fs-pre.target. Jul 10 00:37:05.883446 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Jul 10 00:37:05.883471 systemd[1]: Reached target local-fs.target. Jul 10 00:37:05.884273 systemd[1]: Reached target machines.target. Jul 10 00:37:05.886317 systemd[1]: Starting ldconfig.service... Jul 10 00:37:05.887292 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Jul 10 00:37:05.887351 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Jul 10 00:37:05.888305 systemd[1]: Starting systemd-boot-update.service... Jul 10 00:37:05.890766 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Jul 10 00:37:05.893111 systemd[1]: Starting systemd-machine-id-commit.service... Jul 10 00:37:05.895212 systemd[1]: Starting systemd-sysext.service... Jul 10 00:37:05.896305 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1051 (bootctl) Jul 10 00:37:05.897378 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Jul 10 00:37:05.901000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:37:05.901266 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Jul 10 00:37:05.906941 systemd[1]: Unmounting usr-share-oem.mount... Jul 10 00:37:05.910404 systemd[1]: usr-share-oem.mount: Deactivated successfully. Jul 10 00:37:05.910535 systemd[1]: Unmounted usr-share-oem.mount. Jul 10 00:37:05.922604 kernel: loop0: detected capacity change from 0 to 224512 Jul 10 00:37:05.936316 systemd-fsck[1059]: fsck.fat 4.2 (2021-01-31) Jul 10 00:37:05.936316 systemd-fsck[1059]: /dev/vda1: 790 files, 120731/258078 clusters Jul 10 00:37:05.938106 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Jul 10 00:37:05.963000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:37:05.965540 systemd[1]: Mounting boot.mount... Jul 10 00:37:06.482590 kernel: squashfs: version 4.0 (2009/01/31) Phillip Lougher Jul 10 00:37:06.495947 systemd[1]: Mounted boot.mount. Jul 10 00:37:06.509587 kernel: loop1: detected capacity change from 0 to 224512 Jul 10 00:37:06.513612 (sd-sysext)[1064]: Using extensions 'kubernetes'. Jul 10 00:37:06.513944 (sd-sysext)[1064]: Merged extensions into '/usr'. Jul 10 00:37:06.517232 systemd[1]: Finished systemd-boot-update.service. Jul 10 00:37:06.517000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:37:06.534191 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Jul 10 00:37:06.536108 systemd[1]: Mounting usr-share-oem.mount... Jul 10 00:37:06.537197 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Jul 10 00:37:06.538658 systemd[1]: Starting modprobe@dm_mod.service... Jul 10 00:37:06.540292 systemd[1]: Starting modprobe@efi_pstore.service... Jul 10 00:37:06.542043 systemd[1]: Starting modprobe@loop.service... Jul 10 00:37:06.542814 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Jul 10 00:37:06.542940 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Jul 10 00:37:06.543062 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Jul 10 00:37:06.545538 systemd[1]: Mounted usr-share-oem.mount. Jul 10 00:37:06.546552 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Jul 10 00:37:06.546703 systemd[1]: Finished modprobe@dm_mod.service. Jul 10 00:37:06.547000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:37:06.547000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:37:06.547875 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Jul 10 00:37:06.547975 systemd[1]: Finished modprobe@efi_pstore.service. Jul 10 00:37:06.548000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:37:06.548000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:37:06.549157 systemd[1]: modprobe@loop.service: Deactivated successfully. Jul 10 00:37:06.549257 systemd[1]: Finished modprobe@loop.service. Jul 10 00:37:06.549000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:37:06.549000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:37:06.550434 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Jul 10 00:37:06.550525 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Jul 10 00:37:06.551381 systemd[1]: Finished systemd-sysext.service. Jul 10 00:37:06.551000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:37:06.553212 systemd[1]: Starting ensure-sysext.service... Jul 10 00:37:06.554815 systemd[1]: Starting systemd-tmpfiles-setup.service... Jul 10 00:37:06.560366 systemd[1]: Reloading. Jul 10 00:37:06.623542 systemd-tmpfiles[1071]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Jul 10 00:37:06.624233 /usr/lib/systemd/system-generators/torcx-generator[1091]: time="2025-07-10T00:37:06Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" Jul 10 00:37:06.624261 /usr/lib/systemd/system-generators/torcx-generator[1091]: time="2025-07-10T00:37:06Z" level=info msg="torcx already run" Jul 10 00:37:06.626366 systemd-tmpfiles[1071]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Jul 10 00:37:06.630994 systemd-tmpfiles[1071]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Jul 10 00:37:06.663740 ldconfig[1050]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Jul 10 00:37:06.784821 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Jul 10 00:37:06.784841 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Jul 10 00:37:06.809944 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Jul 10 00:37:06.864000 audit: BPF prog-id=30 op=LOAD Jul 10 00:37:06.864000 audit: BPF prog-id=27 op=UNLOAD Jul 10 00:37:06.864000 audit: BPF prog-id=31 op=LOAD Jul 10 00:37:06.864000 audit: BPF prog-id=32 op=LOAD Jul 10 00:37:06.864000 audit: BPF prog-id=28 op=UNLOAD Jul 10 00:37:06.864000 audit: BPF prog-id=29 op=UNLOAD Jul 10 00:37:06.865000 audit: BPF prog-id=33 op=LOAD Jul 10 00:37:06.865000 audit: BPF prog-id=21 op=UNLOAD Jul 10 00:37:06.865000 audit: BPF prog-id=34 op=LOAD Jul 10 00:37:06.865000 audit: BPF prog-id=35 op=LOAD Jul 10 00:37:06.865000 audit: BPF prog-id=22 op=UNLOAD Jul 10 00:37:06.865000 audit: BPF prog-id=23 op=UNLOAD Jul 10 00:37:06.865000 audit: BPF prog-id=36 op=LOAD Jul 10 00:37:06.866000 audit: BPF prog-id=37 op=LOAD Jul 10 00:37:06.866000 audit: BPF prog-id=24 op=UNLOAD Jul 10 00:37:06.866000 audit: BPF prog-id=25 op=UNLOAD Jul 10 00:37:06.868000 audit: BPF prog-id=38 op=LOAD Jul 10 00:37:06.868000 audit: BPF prog-id=26 op=UNLOAD Jul 10 00:37:06.880137 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Jul 10 00:37:06.880326 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Jul 10 00:37:06.919304 systemd[1]: Starting modprobe@dm_mod.service... Jul 10 00:37:06.921835 systemd[1]: Starting modprobe@efi_pstore.service... Jul 10 00:37:06.923865 systemd[1]: Starting modprobe@loop.service... Jul 10 00:37:06.924687 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Jul 10 00:37:06.924801 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Jul 10 00:37:06.924905 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Jul 10 00:37:06.925874 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Jul 10 00:37:06.926002 systemd[1]: Finished modprobe@dm_mod.service. Jul 10 00:37:06.941000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:37:06.941000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:37:06.942193 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Jul 10 00:37:06.942294 systemd[1]: Finished modprobe@efi_pstore.service. Jul 10 00:37:06.942000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:37:06.942000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:37:06.943656 systemd[1]: modprobe@loop.service: Deactivated successfully. Jul 10 00:37:06.943760 systemd[1]: Finished modprobe@loop.service. Jul 10 00:37:06.944000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:37:06.944000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:37:06.946063 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Jul 10 00:37:06.946250 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Jul 10 00:37:06.947598 systemd[1]: Starting modprobe@dm_mod.service... Jul 10 00:37:06.949689 systemd[1]: Starting modprobe@efi_pstore.service... Jul 10 00:37:06.951805 systemd[1]: Starting modprobe@loop.service... Jul 10 00:37:06.952673 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Jul 10 00:37:06.952872 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Jul 10 00:37:06.952969 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Jul 10 00:37:06.953968 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Jul 10 00:37:06.954079 systemd[1]: Finished modprobe@dm_mod.service. Jul 10 00:37:06.954000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:37:06.954000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:37:06.955280 systemd[1]: Finished systemd-tmpfiles-setup.service. Jul 10 00:37:06.955000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:37:06.956482 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Jul 10 00:37:06.956598 systemd[1]: Finished modprobe@efi_pstore.service. Jul 10 00:37:06.956000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:37:06.956000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:37:06.957788 systemd[1]: modprobe@loop.service: Deactivated successfully. Jul 10 00:37:06.957889 systemd[1]: Finished modprobe@loop.service. Jul 10 00:37:06.958000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:37:06.958000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:37:06.960914 systemd[1]: Starting audit-rules.service... Jul 10 00:37:06.963031 systemd[1]: Starting clean-ca-certificates.service... Jul 10 00:37:06.967000 audit: BPF prog-id=39 op=LOAD Jul 10 00:37:06.971000 audit: BPF prog-id=40 op=LOAD Jul 10 00:37:06.965541 systemd[1]: Starting systemd-journal-catalog-update.service... Jul 10 00:37:06.966605 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Jul 10 00:37:06.977000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:37:06.966857 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Jul 10 00:37:06.968921 systemd[1]: Starting systemd-resolved.service... Jul 10 00:37:06.972806 systemd[1]: Starting systemd-timesyncd.service... Jul 10 00:37:06.975041 systemd[1]: Starting systemd-update-utmp.service... Jul 10 00:37:06.977036 systemd[1]: Finished clean-ca-certificates.service. Jul 10 00:37:06.979000 audit[1152]: SYSTEM_BOOT pid=1152 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Jul 10 00:37:06.984752 augenrules[1159]: No rules Jul 10 00:37:06.983000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Jul 10 00:37:06.983000 audit[1159]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7fff4694e6b0 a2=420 a3=0 items=0 ppid=1139 pid=1159 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:37:06.983000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Jul 10 00:37:06.986750 systemd[1]: Finished systemd-journal-catalog-update.service. Jul 10 00:37:06.988191 systemd[1]: Finished audit-rules.service. Jul 10 00:37:06.989844 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Jul 10 00:37:06.990095 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Jul 10 00:37:06.991972 systemd[1]: Starting modprobe@dm_mod.service... Jul 10 00:37:06.993915 systemd[1]: Starting modprobe@drm.service... Jul 10 00:37:06.995674 systemd[1]: Starting modprobe@efi_pstore.service... Jul 10 00:37:06.997759 systemd[1]: Starting modprobe@loop.service... Jul 10 00:37:06.999898 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Jul 10 00:37:06.999948 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Jul 10 00:37:07.001035 systemd[1]: Starting systemd-networkd-wait-online.service... Jul 10 00:37:07.002146 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Jul 10 00:37:07.002239 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Jul 10 00:37:07.003250 systemd[1]: Finished ensure-sysext.service. Jul 10 00:37:07.004410 systemd[1]: Finished systemd-update-utmp.service. Jul 10 00:37:07.005642 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Jul 10 00:37:07.005764 systemd[1]: Finished modprobe@dm_mod.service. Jul 10 00:37:07.006883 systemd[1]: modprobe@drm.service: Deactivated successfully. Jul 10 00:37:07.006990 systemd[1]: Finished modprobe@drm.service. Jul 10 00:37:07.008085 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Jul 10 00:37:07.008205 systemd[1]: Finished modprobe@efi_pstore.service. Jul 10 00:37:07.009293 systemd[1]: modprobe@loop.service: Deactivated successfully. Jul 10 00:37:07.009393 systemd[1]: Finished modprobe@loop.service. Jul 10 00:37:07.012799 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Jul 10 00:37:07.012846 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Jul 10 00:37:07.029467 systemd[1]: Finished ldconfig.service. Jul 10 00:37:07.032368 systemd[1]: Starting systemd-update-done.service... Jul 10 00:37:07.047132 systemd-resolved[1148]: Positive Trust Anchors: Jul 10 00:37:07.047590 systemd-resolved[1148]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Jul 10 00:37:07.047721 systemd-resolved[1148]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Jul 10 00:37:07.048368 systemd[1]: Started systemd-timesyncd.service. Jul 10 00:37:08.112662 systemd-timesyncd[1149]: Contacted time server 10.0.0.1:123 (10.0.0.1). Jul 10 00:37:08.112734 systemd[1]: Reached target time-set.target. Jul 10 00:37:08.113032 systemd-timesyncd[1149]: Initial clock synchronization to Thu 2025-07-10 00:37:08.112580 UTC. Jul 10 00:37:08.114862 systemd[1]: Finished systemd-update-done.service. Jul 10 00:37:08.130722 systemd-resolved[1148]: Defaulting to hostname 'linux'. Jul 10 00:37:08.132241 systemd[1]: Started systemd-resolved.service. Jul 10 00:37:08.133231 systemd[1]: Reached target network.target. Jul 10 00:37:08.134114 systemd[1]: Reached target nss-lookup.target. Jul 10 00:37:08.135014 systemd[1]: Reached target sysinit.target. Jul 10 00:37:08.135977 systemd[1]: Started motdgen.path. Jul 10 00:37:08.136779 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Jul 10 00:37:08.138166 systemd[1]: Started logrotate.timer. Jul 10 00:37:08.139181 systemd[1]: Started mdadm.timer. Jul 10 00:37:08.140022 systemd[1]: Started systemd-tmpfiles-clean.timer. Jul 10 00:37:08.140952 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Jul 10 00:37:08.140984 systemd[1]: Reached target paths.target. Jul 10 00:37:08.141812 systemd[1]: Reached target timers.target. Jul 10 00:37:08.143034 systemd[1]: Listening on dbus.socket. Jul 10 00:37:08.144974 systemd[1]: Starting docker.socket... Jul 10 00:37:08.148099 systemd[1]: Listening on sshd.socket. Jul 10 00:37:08.148985 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Jul 10 00:37:08.149367 systemd[1]: Listening on docker.socket. Jul 10 00:37:08.150257 systemd[1]: Reached target sockets.target. Jul 10 00:37:08.151115 systemd[1]: Reached target basic.target. Jul 10 00:37:08.151989 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Jul 10 00:37:08.152017 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Jul 10 00:37:08.153079 systemd[1]: Starting containerd.service... Jul 10 00:37:08.155084 systemd[1]: Starting dbus.service... Jul 10 00:37:08.157105 systemd[1]: Starting enable-oem-cloudinit.service... Jul 10 00:37:08.159553 systemd[1]: Starting extend-filesystems.service... Jul 10 00:37:08.160711 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Jul 10 00:37:08.162058 jq[1177]: false Jul 10 00:37:08.162464 systemd[1]: Starting motdgen.service... Jul 10 00:37:08.164895 systemd[1]: Starting ssh-key-proc-cmdline.service... Jul 10 00:37:08.176271 systemd[1]: Starting sshd-keygen.service... Jul 10 00:37:08.214386 systemd[1]: Starting systemd-logind.service... Jul 10 00:37:08.215322 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Jul 10 00:37:08.215439 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). Jul 10 00:37:08.215601 extend-filesystems[1178]: Found loop1 Jul 10 00:37:08.216705 extend-filesystems[1178]: Found sr0 Jul 10 00:37:08.216705 extend-filesystems[1178]: Found vda Jul 10 00:37:08.216705 extend-filesystems[1178]: Found vda1 Jul 10 00:37:08.229665 extend-filesystems[1178]: Found vda2 Jul 10 00:37:08.229665 extend-filesystems[1178]: Found vda3 Jul 10 00:37:08.229665 extend-filesystems[1178]: Found usr Jul 10 00:37:08.229665 extend-filesystems[1178]: Found vda4 Jul 10 00:37:08.229665 extend-filesystems[1178]: Found vda6 Jul 10 00:37:08.229665 extend-filesystems[1178]: Found vda7 Jul 10 00:37:08.229665 extend-filesystems[1178]: Found vda9 Jul 10 00:37:08.229665 extend-filesystems[1178]: Checking size of /dev/vda9 Jul 10 00:37:08.217319 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Jul 10 00:37:08.232928 dbus-daemon[1176]: [system] SELinux support is enabled Jul 10 00:37:08.218594 systemd[1]: Starting update-engine.service... Jul 10 00:37:08.221327 systemd[1]: Starting update-ssh-keys-after-ignition.service... Jul 10 00:37:08.227533 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Jul 10 00:37:08.241027 jq[1196]: true Jul 10 00:37:08.229419 systemd[1]: Finished systemd-machine-id-commit.service. Jul 10 00:37:08.231721 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Jul 10 00:37:08.231912 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Jul 10 00:37:08.232215 systemd[1]: motdgen.service: Deactivated successfully. Jul 10 00:37:08.232376 systemd[1]: Finished motdgen.service. Jul 10 00:37:08.233783 systemd[1]: Started dbus.service. Jul 10 00:37:08.239118 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Jul 10 00:37:08.239279 systemd[1]: Finished ssh-key-proc-cmdline.service. Jul 10 00:37:08.245494 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Jul 10 00:37:08.245532 systemd[1]: Reached target system-config.target. Jul 10 00:37:08.246558 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Jul 10 00:37:08.246589 systemd[1]: Reached target user-config.target. Jul 10 00:37:08.258837 extend-filesystems[1178]: Resized partition /dev/vda9 Jul 10 00:37:08.276804 kernel: EXT4-fs (vda9): resizing filesystem from 553472 to 1864699 blocks Jul 10 00:37:08.276861 jq[1202]: true Jul 10 00:37:08.277000 extend-filesystems[1203]: resize2fs 1.46.5 (30-Dec-2021) Jul 10 00:37:08.291372 systemd-logind[1190]: Watching system buttons on /dev/input/event1 (Power Button) Jul 10 00:37:08.291395 systemd-logind[1190]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard) Jul 10 00:37:08.292148 systemd-logind[1190]: New seat seat0. Jul 10 00:37:08.295589 update_engine[1193]: I0710 00:37:08.294806 1193 main.cc:92] Flatcar Update Engine starting Jul 10 00:37:08.297099 systemd[1]: Started systemd-logind.service. Jul 10 00:37:08.301519 systemd[1]: Started update-engine.service. Jul 10 00:37:08.302542 update_engine[1193]: I0710 00:37:08.301913 1193 update_check_scheduler.cc:74] Next update check in 6m45s Jul 10 00:37:08.305000 systemd[1]: Started locksmithd.service. Jul 10 00:37:08.372142 env[1200]: time="2025-07-10T00:37:08.372089220Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Jul 10 00:37:08.378431 kernel: EXT4-fs (vda9): resized filesystem to 1864699 Jul 10 00:37:08.392641 env[1200]: time="2025-07-10T00:37:08.392581020Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Jul 10 00:37:08.397041 extend-filesystems[1203]: Filesystem at /dev/vda9 is mounted on /; on-line resizing required Jul 10 00:37:08.397041 extend-filesystems[1203]: old_desc_blocks = 1, new_desc_blocks = 1 Jul 10 00:37:08.397041 extend-filesystems[1203]: The filesystem on /dev/vda9 is now 1864699 (4k) blocks long. Jul 10 00:37:08.402242 env[1200]: time="2025-07-10T00:37:08.396622539Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Jul 10 00:37:08.402242 env[1200]: time="2025-07-10T00:37:08.398133002Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.186-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Jul 10 00:37:08.402242 env[1200]: time="2025-07-10T00:37:08.398156726Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Jul 10 00:37:08.402242 env[1200]: time="2025-07-10T00:37:08.398366259Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Jul 10 00:37:08.402242 env[1200]: time="2025-07-10T00:37:08.398388310Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Jul 10 00:37:08.402242 env[1200]: time="2025-07-10T00:37:08.398400984Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Jul 10 00:37:08.402242 env[1200]: time="2025-07-10T00:37:08.398427173Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Jul 10 00:37:08.402242 env[1200]: time="2025-07-10T00:37:08.398503346Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Jul 10 00:37:08.402242 env[1200]: time="2025-07-10T00:37:08.398725022Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Jul 10 00:37:08.402242 env[1200]: time="2025-07-10T00:37:08.398865355Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Jul 10 00:37:08.397462 systemd[1]: extend-filesystems.service: Deactivated successfully. Jul 10 00:37:08.402584 extend-filesystems[1178]: Resized filesystem in /dev/vda9 Jul 10 00:37:08.403725 env[1200]: time="2025-07-10T00:37:08.398880934Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Jul 10 00:37:08.403725 env[1200]: time="2025-07-10T00:37:08.398926710Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Jul 10 00:37:08.403725 env[1200]: time="2025-07-10T00:37:08.398940786Z" level=info msg="metadata content store policy set" policy=shared Jul 10 00:37:08.397666 systemd[1]: Finished extend-filesystems.service. Jul 10 00:37:08.404893 bash[1224]: Updated "/home/core/.ssh/authorized_keys" Jul 10 00:37:08.405720 systemd[1]: Finished update-ssh-keys-after-ignition.service. Jul 10 00:37:08.408464 env[1200]: time="2025-07-10T00:37:08.408419182Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Jul 10 00:37:08.408464 env[1200]: time="2025-07-10T00:37:08.408457283Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Jul 10 00:37:08.408547 env[1200]: time="2025-07-10T00:37:08.408470779Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Jul 10 00:37:08.408547 env[1200]: time="2025-07-10T00:37:08.408516885Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Jul 10 00:37:08.408547 env[1200]: time="2025-07-10T00:37:08.408530971Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Jul 10 00:37:08.408547 env[1200]: time="2025-07-10T00:37:08.408542984Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Jul 10 00:37:08.408661 env[1200]: time="2025-07-10T00:37:08.408554566Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Jul 10 00:37:08.408661 env[1200]: time="2025-07-10T00:37:08.408610821Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Jul 10 00:37:08.408661 env[1200]: time="2025-07-10T00:37:08.408622894Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Jul 10 00:37:08.408661 env[1200]: time="2025-07-10T00:37:08.408634946Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Jul 10 00:37:08.408661 env[1200]: time="2025-07-10T00:37:08.408646448Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Jul 10 00:37:08.408661 env[1200]: time="2025-07-10T00:37:08.408657799Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Jul 10 00:37:08.408824 env[1200]: time="2025-07-10T00:37:08.408746826Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Jul 10 00:37:08.408858 env[1200]: time="2025-07-10T00:37:08.408818611Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Jul 10 00:37:08.409263 env[1200]: time="2025-07-10T00:37:08.409104778Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Jul 10 00:37:08.409263 env[1200]: time="2025-07-10T00:37:08.409144021Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Jul 10 00:37:08.409263 env[1200]: time="2025-07-10T00:37:08.409157607Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Jul 10 00:37:08.409263 env[1200]: time="2025-07-10T00:37:08.409223831Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Jul 10 00:37:08.409263 env[1200]: time="2025-07-10T00:37:08.409238168Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Jul 10 00:37:08.409263 env[1200]: time="2025-07-10T00:37:08.409249349Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Jul 10 00:37:08.409263 env[1200]: time="2025-07-10T00:37:08.409259638Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Jul 10 00:37:08.409529 env[1200]: time="2025-07-10T00:37:08.409332455Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Jul 10 00:37:08.409529 env[1200]: time="2025-07-10T00:37:08.409345469Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Jul 10 00:37:08.409529 env[1200]: time="2025-07-10T00:37:08.409357201Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Jul 10 00:37:08.409529 env[1200]: time="2025-07-10T00:37:08.409367440Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Jul 10 00:37:08.409529 env[1200]: time="2025-07-10T00:37:08.409379032Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Jul 10 00:37:08.409529 env[1200]: time="2025-07-10T00:37:08.409514296Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Jul 10 00:37:08.409529 env[1200]: time="2025-07-10T00:37:08.409529474Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Jul 10 00:37:08.409711 env[1200]: time="2025-07-10T00:37:08.409539914Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Jul 10 00:37:08.409711 env[1200]: time="2025-07-10T00:37:08.409549882Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Jul 10 00:37:08.409711 env[1200]: time="2025-07-10T00:37:08.409563808Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Jul 10 00:37:08.409711 env[1200]: time="2025-07-10T00:37:08.409573927Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Jul 10 00:37:08.409711 env[1200]: time="2025-07-10T00:37:08.409594576Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Jul 10 00:37:08.409711 env[1200]: time="2025-07-10T00:37:08.409628470Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Jul 10 00:37:08.409945 env[1200]: time="2025-07-10T00:37:08.409852049Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Jul 10 00:37:08.409945 env[1200]: time="2025-07-10T00:37:08.409938030Z" level=info msg="Connect containerd service" Jul 10 00:37:08.411029 env[1200]: time="2025-07-10T00:37:08.409974839Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Jul 10 00:37:08.411029 env[1200]: time="2025-07-10T00:37:08.410499563Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Jul 10 00:37:08.411029 env[1200]: time="2025-07-10T00:37:08.410608918Z" level=info msg="Start subscribing containerd event" Jul 10 00:37:08.411029 env[1200]: time="2025-07-10T00:37:08.410662529Z" level=info msg="Start recovering state" Jul 10 00:37:08.411029 env[1200]: time="2025-07-10T00:37:08.410728543Z" level=info msg="Start event monitor" Jul 10 00:37:08.411029 env[1200]: time="2025-07-10T00:37:08.410747769Z" level=info msg="Start snapshots syncer" Jul 10 00:37:08.411029 env[1200]: time="2025-07-10T00:37:08.410760352Z" level=info msg="Start cni network conf syncer for default" Jul 10 00:37:08.411029 env[1200]: time="2025-07-10T00:37:08.410766754Z" level=info msg="Start streaming server" Jul 10 00:37:08.411234 env[1200]: time="2025-07-10T00:37:08.411129244Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Jul 10 00:37:08.411234 env[1200]: time="2025-07-10T00:37:08.411177184Z" level=info msg=serving... address=/run/containerd/containerd.sock Jul 10 00:37:08.411291 env[1200]: time="2025-07-10T00:37:08.411254469Z" level=info msg="containerd successfully booted in 0.040069s" Jul 10 00:37:08.411328 systemd[1]: Started containerd.service. Jul 10 00:37:08.428670 locksmithd[1225]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Jul 10 00:37:08.528594 systemd-networkd[1022]: eth0: Gained IPv6LL Jul 10 00:37:08.530952 systemd[1]: Finished systemd-networkd-wait-online.service. Jul 10 00:37:08.532458 systemd[1]: Reached target network-online.target. Jul 10 00:37:08.535371 systemd[1]: Starting kubelet.service... Jul 10 00:37:09.358966 sshd_keygen[1197]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Jul 10 00:37:09.382797 systemd[1]: Finished sshd-keygen.service. Jul 10 00:37:09.391949 systemd[1]: Starting issuegen.service... Jul 10 00:37:09.393222 systemd[1]: issuegen.service: Deactivated successfully. Jul 10 00:37:09.393360 systemd[1]: Finished issuegen.service. Jul 10 00:37:09.396115 systemd[1]: Starting systemd-user-sessions.service... Jul 10 00:37:09.402593 systemd[1]: Finished systemd-user-sessions.service. Jul 10 00:37:09.405335 systemd[1]: Started getty@tty1.service. Jul 10 00:37:09.408628 systemd[1]: Started serial-getty@ttyS0.service. Jul 10 00:37:09.409862 systemd[1]: Reached target getty.target. Jul 10 00:37:09.894339 systemd[1]: Created slice system-sshd.slice. Jul 10 00:37:09.987268 systemd[1]: Started sshd@0-10.0.0.41:22-10.0.0.1:51114.service. Jul 10 00:37:09.994052 systemd[1]: Started kubelet.service. Jul 10 00:37:09.995577 systemd[1]: Reached target multi-user.target. Jul 10 00:37:09.998111 systemd[1]: Starting systemd-update-utmp-runlevel.service... Jul 10 00:37:10.006944 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Jul 10 00:37:10.007088 systemd[1]: Finished systemd-update-utmp-runlevel.service. Jul 10 00:37:10.008376 systemd[1]: Startup finished in 789ms (kernel) + 4.536s (initrd) + 8.572s (userspace) = 13.897s. Jul 10 00:37:10.035600 sshd[1252]: Accepted publickey for core from 10.0.0.1 port 51114 ssh2: RSA SHA256:suUhWV759MqU0C+Dl6JG8TPW8PqnqlsB4qushdi9Ejw Jul 10 00:37:10.038594 sshd[1252]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 10 00:37:10.047643 systemd[1]: Created slice user-500.slice. Jul 10 00:37:10.048921 systemd[1]: Starting user-runtime-dir@500.service... Jul 10 00:37:10.051287 systemd-logind[1190]: New session 1 of user core. Jul 10 00:37:10.059769 systemd[1]: Finished user-runtime-dir@500.service. Jul 10 00:37:10.061370 systemd[1]: Starting user@500.service... Jul 10 00:37:10.064228 (systemd)[1259]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Jul 10 00:37:10.135560 systemd[1259]: Queued start job for default target default.target. Jul 10 00:37:10.136022 systemd[1259]: Reached target paths.target. Jul 10 00:37:10.136048 systemd[1259]: Reached target sockets.target. Jul 10 00:37:10.136063 systemd[1259]: Reached target timers.target. Jul 10 00:37:10.136078 systemd[1259]: Reached target basic.target. Jul 10 00:37:10.136201 systemd[1]: Started user@500.service. Jul 10 00:37:10.137100 systemd[1259]: Reached target default.target. Jul 10 00:37:10.137150 systemd[1259]: Startup finished in 65ms. Jul 10 00:37:10.137299 systemd[1]: Started session-1.scope. Jul 10 00:37:10.191241 systemd[1]: Started sshd@1-10.0.0.41:22-10.0.0.1:51120.service. Jul 10 00:37:10.225064 sshd[1273]: Accepted publickey for core from 10.0.0.1 port 51120 ssh2: RSA SHA256:suUhWV759MqU0C+Dl6JG8TPW8PqnqlsB4qushdi9Ejw Jul 10 00:37:10.225875 sshd[1273]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 10 00:37:10.230604 systemd[1]: Started session-2.scope. Jul 10 00:37:10.230959 systemd-logind[1190]: New session 2 of user core. Jul 10 00:37:10.291496 sshd[1273]: pam_unix(sshd:session): session closed for user core Jul 10 00:37:10.295626 systemd[1]: sshd@1-10.0.0.41:22-10.0.0.1:51120.service: Deactivated successfully. Jul 10 00:37:10.296315 systemd[1]: session-2.scope: Deactivated successfully. Jul 10 00:37:10.297209 systemd-logind[1190]: Session 2 logged out. Waiting for processes to exit. Jul 10 00:37:10.298989 systemd[1]: Started sshd@2-10.0.0.41:22-10.0.0.1:51130.service. Jul 10 00:37:10.300087 systemd-logind[1190]: Removed session 2. Jul 10 00:37:10.368986 sshd[1279]: Accepted publickey for core from 10.0.0.1 port 51130 ssh2: RSA SHA256:suUhWV759MqU0C+Dl6JG8TPW8PqnqlsB4qushdi9Ejw Jul 10 00:37:10.370311 sshd[1279]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 10 00:37:10.374269 systemd-logind[1190]: New session 3 of user core. Jul 10 00:37:10.375262 systemd[1]: Started session-3.scope. Jul 10 00:37:10.427301 sshd[1279]: pam_unix(sshd:session): session closed for user core Jul 10 00:37:10.430255 systemd[1]: sshd@2-10.0.0.41:22-10.0.0.1:51130.service: Deactivated successfully. Jul 10 00:37:10.430954 systemd[1]: session-3.scope: Deactivated successfully. Jul 10 00:37:10.431588 systemd-logind[1190]: Session 3 logged out. Waiting for processes to exit. Jul 10 00:37:10.432686 systemd[1]: Started sshd@3-10.0.0.41:22-10.0.0.1:51132.service. Jul 10 00:37:10.433679 systemd-logind[1190]: Removed session 3. Jul 10 00:37:10.461761 sshd[1285]: Accepted publickey for core from 10.0.0.1 port 51132 ssh2: RSA SHA256:suUhWV759MqU0C+Dl6JG8TPW8PqnqlsB4qushdi9Ejw Jul 10 00:37:10.494366 sshd[1285]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 10 00:37:10.531463 systemd-logind[1190]: New session 4 of user core. Jul 10 00:37:10.531500 systemd[1]: Started session-4.scope. Jul 10 00:37:10.608662 sshd[1285]: pam_unix(sshd:session): session closed for user core Jul 10 00:37:10.612177 systemd[1]: Started sshd@4-10.0.0.41:22-10.0.0.1:51144.service. Jul 10 00:37:10.612667 systemd[1]: sshd@3-10.0.0.41:22-10.0.0.1:51132.service: Deactivated successfully. Jul 10 00:37:10.613206 systemd[1]: session-4.scope: Deactivated successfully. Jul 10 00:37:10.613807 systemd-logind[1190]: Session 4 logged out. Waiting for processes to exit. Jul 10 00:37:10.614845 systemd-logind[1190]: Removed session 4. Jul 10 00:37:10.642751 sshd[1290]: Accepted publickey for core from 10.0.0.1 port 51144 ssh2: RSA SHA256:suUhWV759MqU0C+Dl6JG8TPW8PqnqlsB4qushdi9Ejw Jul 10 00:37:10.644085 sshd[1290]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 10 00:37:10.647903 systemd-logind[1190]: New session 5 of user core. Jul 10 00:37:10.648655 systemd[1]: Started session-5.scope. Jul 10 00:37:10.708610 sudo[1295]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Jul 10 00:37:10.708809 sudo[1295]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Jul 10 00:37:10.718715 dbus-daemon[1176]: \xd0}Ws\x83U: received setenforce notice (enforcing=2050472608) Jul 10 00:37:10.720764 sudo[1295]: pam_unix(sudo:session): session closed for user root Jul 10 00:37:10.722216 sshd[1290]: pam_unix(sshd:session): session closed for user core Jul 10 00:37:10.725462 systemd[1]: sshd@4-10.0.0.41:22-10.0.0.1:51144.service: Deactivated successfully. Jul 10 00:37:10.725959 systemd[1]: session-5.scope: Deactivated successfully. Jul 10 00:37:10.726471 systemd-logind[1190]: Session 5 logged out. Waiting for processes to exit. Jul 10 00:37:10.729854 systemd[1]: Started sshd@5-10.0.0.41:22-10.0.0.1:51154.service. Jul 10 00:37:10.730851 systemd-logind[1190]: Removed session 5. Jul 10 00:37:10.758087 sshd[1299]: Accepted publickey for core from 10.0.0.1 port 51154 ssh2: RSA SHA256:suUhWV759MqU0C+Dl6JG8TPW8PqnqlsB4qushdi9Ejw Jul 10 00:37:10.759309 sshd[1299]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 10 00:37:10.764131 systemd-logind[1190]: New session 6 of user core. Jul 10 00:37:10.764412 systemd[1]: Started session-6.scope. Jul 10 00:37:10.826662 sudo[1303]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Jul 10 00:37:10.826927 sudo[1303]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Jul 10 00:37:10.830133 sudo[1303]: pam_unix(sudo:session): session closed for user root Jul 10 00:37:10.837701 sudo[1302]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Jul 10 00:37:10.837950 sudo[1302]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Jul 10 00:37:10.841314 kubelet[1255]: E0710 00:37:10.841242 1255 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Jul 10 00:37:10.843887 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Jul 10 00:37:10.844020 systemd[1]: kubelet.service: Failed with result 'exit-code'. Jul 10 00:37:10.844293 systemd[1]: kubelet.service: Consumed 2.074s CPU time. Jul 10 00:37:10.849109 systemd[1]: Stopping audit-rules.service... Jul 10 00:37:10.848000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Jul 10 00:37:10.848000 audit[1306]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7fff172c94f0 a2=420 a3=0 items=0 ppid=1 pid=1306 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:37:10.848000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Jul 10 00:37:10.850303 auditctl[1306]: No rules Jul 10 00:37:10.850461 systemd[1]: audit-rules.service: Deactivated successfully. Jul 10 00:37:10.850585 systemd[1]: Stopped audit-rules.service. Jul 10 00:37:10.849000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:37:10.852858 systemd[1]: Starting audit-rules.service... Jul 10 00:37:10.868267 augenrules[1323]: No rules Jul 10 00:37:10.868759 systemd[1]: Finished audit-rules.service. Jul 10 00:37:10.867000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:37:10.869580 sudo[1302]: pam_unix(sudo:session): session closed for user root Jul 10 00:37:10.868000 audit[1302]: USER_END pid=1302 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 10 00:37:10.868000 audit[1302]: CRED_DISP pid=1302 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 10 00:37:10.870863 sshd[1299]: pam_unix(sshd:session): session closed for user core Jul 10 00:37:10.870000 audit[1299]: USER_END pid=1299 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 10 00:37:10.870000 audit[1299]: CRED_DISP pid=1299 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 10 00:37:10.873257 systemd[1]: sshd@5-10.0.0.41:22-10.0.0.1:51154.service: Deactivated successfully. Jul 10 00:37:10.872000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.0.0.41:22-10.0.0.1:51154 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:37:10.873851 systemd[1]: session-6.scope: Deactivated successfully. Jul 10 00:37:10.874445 systemd-logind[1190]: Session 6 logged out. Waiting for processes to exit. Jul 10 00:37:10.875513 systemd[1]: Started sshd@6-10.0.0.41:22-10.0.0.1:51158.service. Jul 10 00:37:10.874000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.41:22-10.0.0.1:51158 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:37:10.876180 systemd-logind[1190]: Removed session 6. Jul 10 00:37:10.901000 audit[1329]: USER_ACCT pid=1329 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 10 00:37:10.903263 sshd[1329]: Accepted publickey for core from 10.0.0.1 port 51158 ssh2: RSA SHA256:suUhWV759MqU0C+Dl6JG8TPW8PqnqlsB4qushdi9Ejw Jul 10 00:37:10.902000 audit[1329]: CRED_ACQ pid=1329 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 10 00:37:10.902000 audit[1329]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcd63dad40 a2=3 a3=0 items=0 ppid=1 pid=1329 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=7 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:37:10.902000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 10 00:37:10.904182 sshd[1329]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 10 00:37:10.907556 systemd-logind[1190]: New session 7 of user core. Jul 10 00:37:10.908607 systemd[1]: Started session-7.scope. Jul 10 00:37:10.910000 audit[1329]: USER_START pid=1329 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 10 00:37:10.912000 audit[1331]: CRED_ACQ pid=1331 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 10 00:37:10.960000 audit[1332]: USER_ACCT pid=1332 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 10 00:37:10.960000 audit[1332]: CRED_REFR pid=1332 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 10 00:37:10.961739 sudo[1332]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Jul 10 00:37:10.962017 sudo[1332]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Jul 10 00:37:10.964000 audit[1332]: USER_START pid=1332 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 10 00:37:10.978752 systemd[1]: Starting coreos-metadata.service... Jul 10 00:37:10.987943 systemd[1]: coreos-metadata.service: Deactivated successfully. Jul 10 00:37:10.988255 systemd[1]: Finished coreos-metadata.service. Jul 10 00:37:10.987000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=coreos-metadata comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:37:10.987000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=coreos-metadata comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:37:11.771814 systemd[1]: Stopped kubelet.service. Jul 10 00:37:11.770000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:37:11.772793 kernel: kauditd_printk_skb: 190 callbacks suppressed Jul 10 00:37:11.772914 kernel: audit: type=1130 audit(1752107831.770:222): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:37:11.772855 systemd[1]: kubelet.service: Consumed 2.074s CPU time. Jul 10 00:37:11.771000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:37:11.775950 systemd[1]: Starting kubelet.service... Jul 10 00:37:11.778488 kernel: audit: type=1131 audit(1752107831.771:223): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:37:11.796642 systemd[1]: Reloading. Jul 10 00:37:11.868476 /usr/lib/systemd/system-generators/torcx-generator[1390]: time="2025-07-10T00:37:11Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" Jul 10 00:37:11.868508 /usr/lib/systemd/system-generators/torcx-generator[1390]: time="2025-07-10T00:37:11Z" level=info msg="torcx already run" Jul 10 00:37:12.319963 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Jul 10 00:37:12.319981 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Jul 10 00:37:12.337832 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Jul 10 00:37:12.410145 kernel: audit: type=1400 audit(1752107832.397:224): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:12.424958 kernel: audit: type=1400 audit(1752107832.397:225): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:12.424979 kernel: audit: type=1400 audit(1752107832.397:226): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:12.424998 kernel: audit: type=1400 audit(1752107832.397:227): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:12.425016 kernel: audit: type=1400 audit(1752107832.397:228): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:12.425032 kernel: audit: type=1400 audit(1752107832.397:229): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:12.425046 kernel: audit: type=1400 audit(1752107832.397:230): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:12.425181 kernel: audit: type=1400 audit(1752107832.397:231): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:12.397000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:12.397000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:12.397000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:12.397000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:12.397000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:12.397000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:12.397000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:12.397000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:12.397000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:12.403000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:12.403000 audit: BPF prog-id=46 op=LOAD Jul 10 00:37:12.403000 audit: BPF prog-id=30 op=UNLOAD Jul 10 00:37:12.403000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:12.403000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:12.403000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:12.403000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:12.403000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:12.403000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:12.403000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:12.403000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:12.408000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:12.408000 audit: BPF prog-id=47 op=LOAD Jul 10 00:37:12.408000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:12.408000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:12.408000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:12.408000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:12.408000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:12.408000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:12.408000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:12.408000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:12.408000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:12.408000 audit: BPF prog-id=48 op=LOAD Jul 10 00:37:12.408000 audit: BPF prog-id=31 op=UNLOAD Jul 10 00:37:12.408000 audit: BPF prog-id=32 op=UNLOAD Jul 10 00:37:12.409000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:12.409000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:12.409000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:12.409000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:12.409000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:12.409000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:12.409000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:12.409000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:12.409000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:12.412000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:12.412000 audit: BPF prog-id=49 op=LOAD Jul 10 00:37:12.412000 audit: BPF prog-id=33 op=UNLOAD Jul 10 00:37:12.412000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:12.412000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:12.412000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:12.412000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:12.412000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:12.412000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:12.412000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:12.412000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:12.417000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:12.417000 audit: BPF prog-id=50 op=LOAD Jul 10 00:37:12.417000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:12.417000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:12.417000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:12.417000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:12.417000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:12.417000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:12.417000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:12.417000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:12.423000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:12.423000 audit: BPF prog-id=51 op=LOAD Jul 10 00:37:12.423000 audit: BPF prog-id=34 op=UNLOAD Jul 10 00:37:12.423000 audit: BPF prog-id=35 op=UNLOAD Jul 10 00:37:12.424000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:12.424000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:12.424000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:12.424000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:12.424000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:12.424000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:12.424000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:12.424000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:12.424000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:12.424000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:12.424000 audit: BPF prog-id=52 op=LOAD Jul 10 00:37:12.424000 audit: BPF prog-id=40 op=UNLOAD Jul 10 00:37:12.424000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:12.424000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:12.424000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:12.424000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:12.424000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:12.424000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:12.424000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:12.424000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:12.424000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:12.424000 audit: BPF prog-id=53 op=LOAD Jul 10 00:37:12.424000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:12.424000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:12.424000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:12.424000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:12.424000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:12.424000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:12.424000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:12.424000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:12.424000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:12.424000 audit: BPF prog-id=54 op=LOAD Jul 10 00:37:12.424000 audit: BPF prog-id=36 op=UNLOAD Jul 10 00:37:12.424000 audit: BPF prog-id=37 op=UNLOAD Jul 10 00:37:12.425000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:12.425000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:12.425000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:12.425000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:12.425000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:12.425000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:12.425000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:12.425000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:12.425000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:12.425000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:12.425000 audit: BPF prog-id=55 op=LOAD Jul 10 00:37:12.425000 audit: BPF prog-id=44 op=UNLOAD Jul 10 00:37:12.426000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:12.426000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:12.426000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:12.426000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:12.426000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:12.426000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:12.426000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:12.426000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:12.426000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:12.426000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:12.426000 audit: BPF prog-id=56 op=LOAD Jul 10 00:37:12.426000 audit: BPF prog-id=39 op=UNLOAD Jul 10 00:37:12.429000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:12.429000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:12.429000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:12.429000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:12.429000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:12.429000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:12.429000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:12.429000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:12.429000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:12.429000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:12.429000 audit: BPF prog-id=57 op=LOAD Jul 10 00:37:12.430000 audit: BPF prog-id=38 op=UNLOAD Jul 10 00:37:12.430000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:12.430000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:12.430000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:12.430000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:12.430000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:12.430000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:12.430000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:12.430000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:12.430000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:12.430000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:12.430000 audit: BPF prog-id=58 op=LOAD Jul 10 00:37:12.431000 audit: BPF prog-id=41 op=UNLOAD Jul 10 00:37:12.431000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:12.431000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:12.431000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:12.431000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:12.431000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:12.431000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:12.431000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:12.431000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:12.431000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:12.431000 audit: BPF prog-id=59 op=LOAD Jul 10 00:37:12.431000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:12.431000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:12.431000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:12.431000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:12.431000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:12.431000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:12.431000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:12.431000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:12.431000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:12.431000 audit: BPF prog-id=60 op=LOAD Jul 10 00:37:12.431000 audit: BPF prog-id=42 op=UNLOAD Jul 10 00:37:12.431000 audit: BPF prog-id=43 op=UNLOAD Jul 10 00:37:12.442760 systemd[1]: Started kubelet.service. Jul 10 00:37:12.441000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:37:12.444395 systemd[1]: Stopping kubelet.service... Jul 10 00:37:12.444676 systemd[1]: kubelet.service: Deactivated successfully. Jul 10 00:37:12.444841 systemd[1]: Stopped kubelet.service. Jul 10 00:37:12.443000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:37:12.446626 systemd[1]: Starting kubelet.service... Jul 10 00:37:12.562767 systemd[1]: Started kubelet.service. Jul 10 00:37:12.561000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:37:12.618586 kubelet[1438]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Jul 10 00:37:12.618586 kubelet[1438]: Flag --pod-infra-container-image has been deprecated, will be removed in 1.35. Image garbage collector will get sandbox image information from CRI. Jul 10 00:37:12.618586 kubelet[1438]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Jul 10 00:37:12.618586 kubelet[1438]: I0710 00:37:12.617705 1438 server.go:215] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Jul 10 00:37:13.186315 kubelet[1438]: I0710 00:37:13.186250 1438 server.go:520] "Kubelet version" kubeletVersion="v1.32.4" Jul 10 00:37:13.186315 kubelet[1438]: I0710 00:37:13.186308 1438 server.go:522] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Jul 10 00:37:13.186747 kubelet[1438]: I0710 00:37:13.186716 1438 server.go:954] "Client rotation is on, will bootstrap in background" Jul 10 00:37:13.212177 kubelet[1438]: I0710 00:37:13.212136 1438 dynamic_cafile_content.go:161] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Jul 10 00:37:13.221073 kubelet[1438]: E0710 00:37:13.221023 1438 log.go:32] "RuntimeConfig from runtime service failed" err="rpc error: code = Unimplemented desc = unknown method RuntimeConfig for service runtime.v1.RuntimeService" Jul 10 00:37:13.221073 kubelet[1438]: I0710 00:37:13.221070 1438 server.go:1421] "CRI implementation should be updated to support RuntimeConfig when KubeletCgroupDriverFromCRI feature gate has been enabled. Falling back to using cgroupDriver from kubelet config." Jul 10 00:37:13.227573 kubelet[1438]: I0710 00:37:13.227526 1438 server.go:772] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Jul 10 00:37:13.227888 kubelet[1438]: I0710 00:37:13.227847 1438 container_manager_linux.go:268] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Jul 10 00:37:13.228146 kubelet[1438]: I0710 00:37:13.227888 1438 container_manager_linux.go:273] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"10.0.0.41","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null,"CgroupVersion":2} Jul 10 00:37:13.228252 kubelet[1438]: I0710 00:37:13.228161 1438 topology_manager.go:138] "Creating topology manager with none policy" Jul 10 00:37:13.228252 kubelet[1438]: I0710 00:37:13.228174 1438 container_manager_linux.go:304] "Creating device plugin manager" Jul 10 00:37:13.228379 kubelet[1438]: I0710 00:37:13.228361 1438 state_mem.go:36] "Initialized new in-memory state store" Jul 10 00:37:13.231796 kubelet[1438]: I0710 00:37:13.231764 1438 kubelet.go:446] "Attempting to sync node with API server" Jul 10 00:37:13.231850 kubelet[1438]: I0710 00:37:13.231806 1438 kubelet.go:341] "Adding static pod path" path="/etc/kubernetes/manifests" Jul 10 00:37:13.231850 kubelet[1438]: I0710 00:37:13.231847 1438 kubelet.go:352] "Adding apiserver pod source" Jul 10 00:37:13.231909 kubelet[1438]: I0710 00:37:13.231870 1438 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Jul 10 00:37:13.231988 kubelet[1438]: E0710 00:37:13.231955 1438 file.go:98] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 00:37:13.232020 kubelet[1438]: E0710 00:37:13.232003 1438 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 00:37:13.236009 kubelet[1438]: I0710 00:37:13.235970 1438 kuberuntime_manager.go:269] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Jul 10 00:37:13.236586 kubelet[1438]: I0710 00:37:13.236558 1438 kubelet.go:890] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" Jul 10 00:37:13.236727 kubelet[1438]: W0710 00:37:13.236693 1438 reflector.go:569] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope Jul 10 00:37:13.236839 kubelet[1438]: E0710 00:37:13.236820 1438 reflector.go:166] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Service: failed to list *v1.Service: services is forbidden: User \"system:anonymous\" cannot list resource \"services\" in API group \"\" at the cluster scope" logger="UnhandledError" Jul 10 00:37:13.236883 kubelet[1438]: W0710 00:37:13.236847 1438 reflector.go:569] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Node: nodes "10.0.0.41" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope Jul 10 00:37:13.236913 kubelet[1438]: E0710 00:37:13.236889 1438 reflector.go:166] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Node: failed to list *v1.Node: nodes \"10.0.0.41\" is forbidden: User \"system:anonymous\" cannot list resource \"nodes\" in API group \"\" at the cluster scope" logger="UnhandledError" Jul 10 00:37:13.237211 kubelet[1438]: W0710 00:37:13.237175 1438 probe.go:272] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Jul 10 00:37:13.243416 kubelet[1438]: I0710 00:37:13.243363 1438 watchdog_linux.go:99] "Systemd watchdog is not enabled" Jul 10 00:37:13.243477 kubelet[1438]: I0710 00:37:13.243437 1438 server.go:1287] "Started kubelet" Jul 10 00:37:13.243716 kubelet[1438]: I0710 00:37:13.243640 1438 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 Jul 10 00:37:13.244151 kubelet[1438]: I0710 00:37:13.244134 1438 server.go:243] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Jul 10 00:37:13.244278 kubelet[1438]: I0710 00:37:13.244134 1438 server.go:169] "Starting to listen" address="0.0.0.0" port=10250 Jul 10 00:37:13.243000 audit[1438]: AVC avc: denied { mac_admin } for pid=1438 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:13.243000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Jul 10 00:37:13.243000 audit[1438]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000c06990 a1=c000c1a018 a2=c000c06960 a3=25 items=0 ppid=1 pid=1438 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:37:13.243000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Jul 10 00:37:13.243000 audit[1438]: AVC avc: denied { mac_admin } for pid=1438 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:13.243000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Jul 10 00:37:13.243000 audit[1438]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000770ee0 a1=c000c1a030 a2=c000c06a20 a3=25 items=0 ppid=1 pid=1438 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:37:13.243000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Jul 10 00:37:13.245434 kubelet[1438]: I0710 00:37:13.245027 1438 kubelet.go:1507] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/plugins_registry: invalid argument" Jul 10 00:37:13.245434 kubelet[1438]: I0710 00:37:13.245081 1438 kubelet.go:1511] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/plugins: invalid argument" Jul 10 00:37:13.245434 kubelet[1438]: I0710 00:37:13.245174 1438 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Jul 10 00:37:13.246169 kubelet[1438]: I0710 00:37:13.246131 1438 server.go:479] "Adding debug handlers to kubelet server" Jul 10 00:37:13.252932 kubelet[1438]: I0710 00:37:13.252884 1438 dynamic_serving_content.go:135] "Starting controller" name="kubelet-server-cert-files::/var/lib/kubelet/pki/kubelet.crt::/var/lib/kubelet/pki/kubelet.key" Jul 10 00:37:13.255317 kubelet[1438]: E0710 00:37:13.255271 1438 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"10.0.0.41\" not found" Jul 10 00:37:13.255568 kubelet[1438]: I0710 00:37:13.255533 1438 volume_manager.go:297] "Starting Kubelet Volume Manager" Jul 10 00:37:13.256371 kubelet[1438]: I0710 00:37:13.256321 1438 desired_state_of_world_populator.go:150] "Desired state populator starts to run" Jul 10 00:37:13.256634 kubelet[1438]: I0710 00:37:13.256551 1438 reconciler.go:26] "Reconciler: start to sync state" Jul 10 00:37:13.257322 kubelet[1438]: I0710 00:37:13.257284 1438 factory.go:221] Registration of the systemd container factory successfully Jul 10 00:37:13.257669 kubelet[1438]: I0710 00:37:13.257625 1438 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory Jul 10 00:37:13.260524 kubelet[1438]: I0710 00:37:13.260461 1438 factory.go:221] Registration of the containerd container factory successfully Jul 10 00:37:13.260659 kubelet[1438]: E0710 00:37:13.260617 1438 kubelet.go:1555] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Jul 10 00:37:13.268775 kubelet[1438]: E0710 00:37:13.268718 1438 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"10.0.0.41\" not found" node="10.0.0.41" Jul 10 00:37:13.274398 kubelet[1438]: I0710 00:37:13.274377 1438 cpu_manager.go:221] "Starting CPU manager" policy="none" Jul 10 00:37:13.274398 kubelet[1438]: I0710 00:37:13.274393 1438 cpu_manager.go:222] "Reconciling" reconcilePeriod="10s" Jul 10 00:37:13.274513 kubelet[1438]: I0710 00:37:13.274427 1438 state_mem.go:36] "Initialized new in-memory state store" Jul 10 00:37:13.289000 audit[1456]: NETFILTER_CFG table=mangle:2 family=2 entries=2 op=nft_register_chain pid=1456 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 10 00:37:13.289000 audit[1456]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffd7b0b0b40 a2=0 a3=7ffd7b0b0b2c items=0 ppid=1438 pid=1456 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:37:13.289000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Jul 10 00:37:13.290000 audit[1459]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=1459 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 10 00:37:13.290000 audit[1459]: SYSCALL arch=c000003e syscall=46 success=yes exit=132 a0=3 a1=7ffe4afa8e10 a2=0 a3=7ffe4afa8dfc items=0 ppid=1438 pid=1459 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:37:13.290000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Jul 10 00:37:13.356468 kubelet[1438]: E0710 00:37:13.356398 1438 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"10.0.0.41\" not found" Jul 10 00:37:13.456907 kubelet[1438]: E0710 00:37:13.456756 1438 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"10.0.0.41\" not found" Jul 10 00:37:13.557272 kubelet[1438]: E0710 00:37:13.557208 1438 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"10.0.0.41\" not found" Jul 10 00:37:13.291000 audit[1461]: NETFILTER_CFG table=filter:4 family=2 entries=2 op=nft_register_chain pid=1461 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 10 00:37:13.291000 audit[1461]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffd89daa0f0 a2=0 a3=7ffd89daa0dc items=0 ppid=1438 pid=1461 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:37:13.291000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Jul 10 00:37:13.620252 kubelet[1438]: I0710 00:37:13.620221 1438 policy_none.go:49] "None policy: Start" Jul 10 00:37:13.620252 kubelet[1438]: I0710 00:37:13.620254 1438 memory_manager.go:186] "Starting memorymanager" policy="None" Jul 10 00:37:13.620641 kubelet[1438]: I0710 00:37:13.620271 1438 state_mem.go:35] "Initializing new in-memory state store" Jul 10 00:37:13.619000 audit[1466]: NETFILTER_CFG table=filter:5 family=2 entries=2 op=nft_register_chain pid=1466 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 10 00:37:13.619000 audit[1466]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffcc955b9d0 a2=0 a3=7ffcc955b9bc items=0 ppid=1438 pid=1466 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:37:13.619000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Jul 10 00:37:13.630571 systemd[1]: Created slice kubepods.slice. Jul 10 00:37:13.636008 systemd[1]: Created slice kubepods-burstable.slice. Jul 10 00:37:13.638904 systemd[1]: Created slice kubepods-besteffort.slice. Jul 10 00:37:13.646051 kubelet[1438]: I0710 00:37:13.646024 1438 manager.go:519] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Jul 10 00:37:13.646133 kubelet[1438]: I0710 00:37:13.646085 1438 server.go:94] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/device-plugins/: invalid argument" Jul 10 00:37:13.646204 kubelet[1438]: I0710 00:37:13.646185 1438 eviction_manager.go:189] "Eviction manager: starting control loop" Jul 10 00:37:13.646262 kubelet[1438]: I0710 00:37:13.646204 1438 container_log_manager.go:189] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" Jul 10 00:37:13.644000 audit[1438]: AVC avc: denied { mac_admin } for pid=1438 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:13.644000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Jul 10 00:37:13.644000 audit[1438]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0000574a0 a1=c000fea600 a2=c000057470 a3=25 items=0 ppid=1 pid=1438 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:37:13.644000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Jul 10 00:37:13.646866 kubelet[1438]: I0710 00:37:13.646854 1438 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Jul 10 00:37:13.648092 kubelet[1438]: E0710 00:37:13.647881 1438 eviction_manager.go:267] "eviction manager: failed to check if we have separate container filesystem. Ignoring." err="no imagefs label for configured runtime" Jul 10 00:37:13.648092 kubelet[1438]: E0710 00:37:13.647939 1438 eviction_manager.go:292] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"10.0.0.41\" not found" Jul 10 00:37:13.659000 audit[1471]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=1471 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 10 00:37:13.659000 audit[1471]: SYSCALL arch=c000003e syscall=46 success=yes exit=924 a0=3 a1=7ffe0fbb4240 a2=0 a3=7ffe0fbb422c items=0 ppid=1438 pid=1471 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:37:13.659000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Jul 10 00:37:13.660959 kubelet[1438]: I0710 00:37:13.660917 1438 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Jul 10 00:37:13.660000 audit[1472]: NETFILTER_CFG table=mangle:7 family=10 entries=2 op=nft_register_chain pid=1472 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 10 00:37:13.660000 audit[1472]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffd7f7e9ea0 a2=0 a3=7ffd7f7e9e8c items=0 ppid=1438 pid=1472 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:37:13.660000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Jul 10 00:37:13.660000 audit[1473]: NETFILTER_CFG table=mangle:8 family=2 entries=1 op=nft_register_chain pid=1473 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 10 00:37:13.660000 audit[1473]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffef13993a0 a2=0 a3=7ffef139938c items=0 ppid=1438 pid=1473 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:37:13.660000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Jul 10 00:37:13.662425 kubelet[1438]: I0710 00:37:13.662375 1438 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Jul 10 00:37:13.662425 kubelet[1438]: I0710 00:37:13.662425 1438 status_manager.go:227] "Starting to sync pod status with apiserver" Jul 10 00:37:13.662550 kubelet[1438]: I0710 00:37:13.662456 1438 watchdog_linux.go:127] "Systemd watchdog is not enabled or the interval is invalid, so health checking will not be started." Jul 10 00:37:13.662550 kubelet[1438]: I0710 00:37:13.662467 1438 kubelet.go:2382] "Starting kubelet main sync loop" Jul 10 00:37:13.662550 kubelet[1438]: E0710 00:37:13.662517 1438 kubelet.go:2406] "Skipping pod synchronization" err="PLEG is not healthy: pleg has yet to be successful" Jul 10 00:37:13.661000 audit[1474]: NETFILTER_CFG table=nat:9 family=2 entries=2 op=nft_register_chain pid=1474 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 10 00:37:13.661000 audit[1474]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7ffcb1bfbd50 a2=0 a3=7ffcb1bfbd3c items=0 ppid=1438 pid=1474 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:37:13.661000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Jul 10 00:37:13.662000 audit[1475]: NETFILTER_CFG table=mangle:10 family=10 entries=1 op=nft_register_chain pid=1475 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 10 00:37:13.662000 audit[1475]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd74879a60 a2=0 a3=7ffd74879a4c items=0 ppid=1438 pid=1475 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:37:13.662000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Jul 10 00:37:13.662000 audit[1476]: NETFILTER_CFG table=filter:11 family=2 entries=1 op=nft_register_chain pid=1476 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 10 00:37:13.662000 audit[1476]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff818e41f0 a2=0 a3=7fff818e41dc items=0 ppid=1438 pid=1476 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:37:13.662000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Jul 10 00:37:13.663000 audit[1477]: NETFILTER_CFG table=nat:12 family=10 entries=2 op=nft_register_chain pid=1477 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 10 00:37:13.663000 audit[1477]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7fff249bd8e0 a2=0 a3=7fff249bd8cc items=0 ppid=1438 pid=1477 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:37:13.663000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Jul 10 00:37:13.663000 audit[1478]: NETFILTER_CFG table=filter:13 family=10 entries=2 op=nft_register_chain pid=1478 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 10 00:37:13.663000 audit[1478]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffe12655390 a2=0 a3=7ffe1265537c items=0 ppid=1438 pid=1478 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:37:13.663000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Jul 10 00:37:13.747877 kubelet[1438]: I0710 00:37:13.747709 1438 kubelet_node_status.go:75] "Attempting to register node" node="10.0.0.41" Jul 10 00:37:14.188968 kubelet[1438]: I0710 00:37:14.188842 1438 transport.go:147] "Certificate rotation detected, shutting down client connections to start using new credentials" Jul 10 00:37:14.188968 kubelet[1438]: I0710 00:37:14.188921 1438 kubelet_node_status.go:78] "Successfully registered node" node="10.0.0.41" Jul 10 00:37:14.188968 kubelet[1438]: E0710 00:37:14.188948 1438 kubelet_node_status.go:548] "Error updating node status, will retry" err="error getting node \"10.0.0.41\": node \"10.0.0.41\" not found" Jul 10 00:37:14.188000 audit[1332]: USER_END pid=1332 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 10 00:37:14.188000 audit[1332]: CRED_DISP pid=1332 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 10 00:37:14.190679 kubelet[1438]: W0710 00:37:14.189031 1438 reflector.go:492] k8s.io/client-go/informers/factory.go:160: watch of *v1.RuntimeClass ended with: very short watch: k8s.io/client-go/informers/factory.go:160: Unexpected watch close - watch lasted less than a second and no items received Jul 10 00:37:14.190679 kubelet[1438]: W0710 00:37:14.189072 1438 reflector.go:492] k8s.io/client-go/informers/factory.go:160: watch of *v1.CSIDriver ended with: very short watch: k8s.io/client-go/informers/factory.go:160: Unexpected watch close - watch lasted less than a second and no items received Jul 10 00:37:14.190679 kubelet[1438]: E0710 00:37:14.189140 1438 csi_plugin.go:308] Failed to initialize CSINode: error updating CSINode annotation: timed out waiting for the condition; caused by: Post "https://10.0.0.36:6443/apis/storage.k8s.io/v1/csinodes": read tcp 10.0.0.41:49958->10.0.0.36:6443: use of closed network connection Jul 10 00:37:14.189417 sudo[1332]: pam_unix(sudo:session): session closed for user root Jul 10 00:37:14.191056 sshd[1329]: pam_unix(sshd:session): session closed for user core Jul 10 00:37:14.190000 audit[1329]: USER_END pid=1329 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 10 00:37:14.190000 audit[1329]: CRED_DISP pid=1329 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 10 00:37:14.193214 systemd[1]: sshd@6-10.0.0.41:22-10.0.0.1:51158.service: Deactivated successfully. Jul 10 00:37:14.192000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.41:22-10.0.0.1:51158 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:37:14.193903 systemd[1]: session-7.scope: Deactivated successfully. Jul 10 00:37:14.194466 systemd-logind[1190]: Session 7 logged out. Waiting for processes to exit. Jul 10 00:37:14.195181 systemd-logind[1190]: Removed session 7. Jul 10 00:37:14.212880 kubelet[1438]: I0710 00:37:14.212846 1438 kuberuntime_manager.go:1702] "Updating runtime config through cri with podcidr" CIDR="192.168.1.0/24" Jul 10 00:37:14.213379 env[1200]: time="2025-07-10T00:37:14.213328890Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Jul 10 00:37:14.213628 kubelet[1438]: I0710 00:37:14.213551 1438 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.1.0/24" Jul 10 00:37:14.232181 kubelet[1438]: E0710 00:37:14.232146 1438 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 00:37:14.237550 kubelet[1438]: E0710 00:37:14.237512 1438 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"10.0.0.41\" not found" Jul 10 00:37:14.337915 kubelet[1438]: E0710 00:37:14.337873 1438 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"10.0.0.41\" not found" Jul 10 00:37:14.438562 kubelet[1438]: E0710 00:37:14.438505 1438 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"10.0.0.41\" not found" Jul 10 00:37:14.539157 kubelet[1438]: E0710 00:37:14.539067 1438 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"10.0.0.41\" not found" Jul 10 00:37:14.639744 kubelet[1438]: E0710 00:37:14.639699 1438 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"10.0.0.41\" not found" Jul 10 00:37:14.739858 kubelet[1438]: E0710 00:37:14.739813 1438 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"10.0.0.41\" not found" Jul 10 00:37:15.232531 kubelet[1438]: E0710 00:37:15.232488 1438 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 00:37:15.232531 kubelet[1438]: I0710 00:37:15.232510 1438 apiserver.go:52] "Watching apiserver" Jul 10 00:37:15.235817 kubelet[1438]: E0710 00:37:15.235778 1438 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-76p48" podUID="f42a92fd-7908-4d38-9f25-e2008b563302" Jul 10 00:37:15.240904 systemd[1]: Created slice kubepods-besteffort-podc3893254_9bef_44e5_aad9_aac889c79ca9.slice. Jul 10 00:37:15.256866 kubelet[1438]: I0710 00:37:15.256790 1438 desired_state_of_world_populator.go:158] "Finished populating initial desired state of world" Jul 10 00:37:15.264081 systemd[1]: Created slice kubepods-besteffort-pod11697040_1678_4250_8332_129c2aee1304.slice. Jul 10 00:37:15.266769 kubelet[1438]: I0710 00:37:15.266737 1438 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-xpxll\" (UniqueName: \"kubernetes.io/projected/11697040-1678-4250-8332-129c2aee1304-kube-api-access-xpxll\") pod \"calico-node-wrm44\" (UID: \"11697040-1678-4250-8332-129c2aee1304\") " pod="calico-system/calico-node-wrm44" Jul 10 00:37:15.266848 kubelet[1438]: I0710 00:37:15.266773 1438 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/f42a92fd-7908-4d38-9f25-e2008b563302-registration-dir\") pod \"csi-node-driver-76p48\" (UID: \"f42a92fd-7908-4d38-9f25-e2008b563302\") " pod="calico-system/csi-node-driver-76p48" Jul 10 00:37:15.266848 kubelet[1438]: I0710 00:37:15.266795 1438 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/11697040-1678-4250-8332-129c2aee1304-cni-net-dir\") pod \"calico-node-wrm44\" (UID: \"11697040-1678-4250-8332-129c2aee1304\") " pod="calico-system/calico-node-wrm44" Jul 10 00:37:15.266848 kubelet[1438]: I0710 00:37:15.266818 1438 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/11697040-1678-4250-8332-129c2aee1304-policysync\") pod \"calico-node-wrm44\" (UID: \"11697040-1678-4250-8332-129c2aee1304\") " pod="calico-system/calico-node-wrm44" Jul 10 00:37:15.266848 kubelet[1438]: I0710 00:37:15.266840 1438 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/11697040-1678-4250-8332-129c2aee1304-var-lib-calico\") pod \"calico-node-wrm44\" (UID: \"11697040-1678-4250-8332-129c2aee1304\") " pod="calico-system/calico-node-wrm44" Jul 10 00:37:15.266991 kubelet[1438]: I0710 00:37:15.266861 1438 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/f42a92fd-7908-4d38-9f25-e2008b563302-socket-dir\") pod \"csi-node-driver-76p48\" (UID: \"f42a92fd-7908-4d38-9f25-e2008b563302\") " pod="calico-system/csi-node-driver-76p48" Jul 10 00:37:15.266991 kubelet[1438]: I0710 00:37:15.266881 1438 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/c3893254-9bef-44e5-aad9-aac889c79ca9-lib-modules\") pod \"kube-proxy-6h4qb\" (UID: \"c3893254-9bef-44e5-aad9-aac889c79ca9\") " pod="kube-system/kube-proxy-6h4qb" Jul 10 00:37:15.266991 kubelet[1438]: I0710 00:37:15.266901 1438 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-d5hg5\" (UniqueName: \"kubernetes.io/projected/c3893254-9bef-44e5-aad9-aac889c79ca9-kube-api-access-d5hg5\") pod \"kube-proxy-6h4qb\" (UID: \"c3893254-9bef-44e5-aad9-aac889c79ca9\") " pod="kube-system/kube-proxy-6h4qb" Jul 10 00:37:15.266991 kubelet[1438]: I0710 00:37:15.266924 1438 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/11697040-1678-4250-8332-129c2aee1304-lib-modules\") pod \"calico-node-wrm44\" (UID: \"11697040-1678-4250-8332-129c2aee1304\") " pod="calico-system/calico-node-wrm44" Jul 10 00:37:15.266991 kubelet[1438]: I0710 00:37:15.266947 1438 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/11697040-1678-4250-8332-129c2aee1304-tigera-ca-bundle\") pod \"calico-node-wrm44\" (UID: \"11697040-1678-4250-8332-129c2aee1304\") " pod="calico-system/calico-node-wrm44" Jul 10 00:37:15.267164 kubelet[1438]: I0710 00:37:15.266984 1438 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/11697040-1678-4250-8332-129c2aee1304-var-run-calico\") pod \"calico-node-wrm44\" (UID: \"11697040-1678-4250-8332-129c2aee1304\") " pod="calico-system/calico-node-wrm44" Jul 10 00:37:15.267164 kubelet[1438]: I0710 00:37:15.267036 1438 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/f42a92fd-7908-4d38-9f25-e2008b563302-varrun\") pod \"csi-node-driver-76p48\" (UID: \"f42a92fd-7908-4d38-9f25-e2008b563302\") " pod="calico-system/csi-node-driver-76p48" Jul 10 00:37:15.267164 kubelet[1438]: I0710 00:37:15.267059 1438 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-85x6p\" (UniqueName: \"kubernetes.io/projected/f42a92fd-7908-4d38-9f25-e2008b563302-kube-api-access-85x6p\") pod \"csi-node-driver-76p48\" (UID: \"f42a92fd-7908-4d38-9f25-e2008b563302\") " pod="calico-system/csi-node-driver-76p48" Jul 10 00:37:15.267164 kubelet[1438]: I0710 00:37:15.267079 1438 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/c3893254-9bef-44e5-aad9-aac889c79ca9-kube-proxy\") pod \"kube-proxy-6h4qb\" (UID: \"c3893254-9bef-44e5-aad9-aac889c79ca9\") " pod="kube-system/kube-proxy-6h4qb" Jul 10 00:37:15.267164 kubelet[1438]: I0710 00:37:15.267099 1438 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/11697040-1678-4250-8332-129c2aee1304-cni-log-dir\") pod \"calico-node-wrm44\" (UID: \"11697040-1678-4250-8332-129c2aee1304\") " pod="calico-system/calico-node-wrm44" Jul 10 00:37:15.267336 kubelet[1438]: I0710 00:37:15.267131 1438 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/11697040-1678-4250-8332-129c2aee1304-flexvol-driver-host\") pod \"calico-node-wrm44\" (UID: \"11697040-1678-4250-8332-129c2aee1304\") " pod="calico-system/calico-node-wrm44" Jul 10 00:37:15.267336 kubelet[1438]: I0710 00:37:15.267172 1438 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/11697040-1678-4250-8332-129c2aee1304-xtables-lock\") pod \"calico-node-wrm44\" (UID: \"11697040-1678-4250-8332-129c2aee1304\") " pod="calico-system/calico-node-wrm44" Jul 10 00:37:15.267336 kubelet[1438]: I0710 00:37:15.267206 1438 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/c3893254-9bef-44e5-aad9-aac889c79ca9-xtables-lock\") pod \"kube-proxy-6h4qb\" (UID: \"c3893254-9bef-44e5-aad9-aac889c79ca9\") " pod="kube-system/kube-proxy-6h4qb" Jul 10 00:37:15.267336 kubelet[1438]: I0710 00:37:15.267223 1438 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/11697040-1678-4250-8332-129c2aee1304-cni-bin-dir\") pod \"calico-node-wrm44\" (UID: \"11697040-1678-4250-8332-129c2aee1304\") " pod="calico-system/calico-node-wrm44" Jul 10 00:37:15.267336 kubelet[1438]: I0710 00:37:15.267240 1438 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/11697040-1678-4250-8332-129c2aee1304-node-certs\") pod \"calico-node-wrm44\" (UID: \"11697040-1678-4250-8332-129c2aee1304\") " pod="calico-system/calico-node-wrm44" Jul 10 00:37:15.267509 kubelet[1438]: I0710 00:37:15.267269 1438 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/f42a92fd-7908-4d38-9f25-e2008b563302-kubelet-dir\") pod \"csi-node-driver-76p48\" (UID: \"f42a92fd-7908-4d38-9f25-e2008b563302\") " pod="calico-system/csi-node-driver-76p48" Jul 10 00:37:15.368612 kubelet[1438]: I0710 00:37:15.368566 1438 swap_util.go:74] "error creating dir to test if tmpfs noswap is enabled. Assuming not supported" mount path="" error="stat /var/lib/kubelet/plugins/kubernetes.io/empty-dir: no such file or directory" Jul 10 00:37:15.369146 kubelet[1438]: E0710 00:37:15.369120 1438 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 10 00:37:15.369146 kubelet[1438]: W0710 00:37:15.369142 1438 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 10 00:37:15.369248 kubelet[1438]: E0710 00:37:15.369183 1438 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 10 00:37:15.369694 kubelet[1438]: E0710 00:37:15.369667 1438 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 10 00:37:15.369694 kubelet[1438]: W0710 00:37:15.369685 1438 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 10 00:37:15.369800 kubelet[1438]: E0710 00:37:15.369705 1438 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 10 00:37:15.372153 kubelet[1438]: E0710 00:37:15.372133 1438 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 10 00:37:15.372153 kubelet[1438]: W0710 00:37:15.372150 1438 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 10 00:37:15.372265 kubelet[1438]: E0710 00:37:15.372169 1438 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 10 00:37:15.376951 kubelet[1438]: E0710 00:37:15.376918 1438 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 10 00:37:15.376951 kubelet[1438]: W0710 00:37:15.376941 1438 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 10 00:37:15.377112 kubelet[1438]: E0710 00:37:15.376972 1438 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 10 00:37:15.377199 kubelet[1438]: E0710 00:37:15.377173 1438 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 10 00:37:15.377199 kubelet[1438]: W0710 00:37:15.377194 1438 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 10 00:37:15.377329 kubelet[1438]: E0710 00:37:15.377212 1438 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 10 00:37:15.378761 kubelet[1438]: E0710 00:37:15.378743 1438 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 10 00:37:15.378761 kubelet[1438]: W0710 00:37:15.378759 1438 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 10 00:37:15.378856 kubelet[1438]: E0710 00:37:15.378775 1438 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 10 00:37:15.563377 kubelet[1438]: E0710 00:37:15.563237 1438 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Jul 10 00:37:15.564194 env[1200]: time="2025-07-10T00:37:15.564140864Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-6h4qb,Uid:c3893254-9bef-44e5-aad9-aac889c79ca9,Namespace:kube-system,Attempt:0,}" Jul 10 00:37:15.567132 env[1200]: time="2025-07-10T00:37:15.567087741Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-wrm44,Uid:11697040-1678-4250-8332-129c2aee1304,Namespace:calico-system,Attempt:0,}" Jul 10 00:37:16.233596 kubelet[1438]: E0710 00:37:16.233539 1438 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 00:37:16.645442 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3744943173.mount: Deactivated successfully. Jul 10 00:37:16.652711 env[1200]: time="2025-07-10T00:37:16.652667190Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 10 00:37:16.653494 env[1200]: time="2025-07-10T00:37:16.653470456Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 10 00:37:16.657716 env[1200]: time="2025-07-10T00:37:16.657666395Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 10 00:37:16.659701 env[1200]: time="2025-07-10T00:37:16.659677907Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 10 00:37:16.661255 env[1200]: time="2025-07-10T00:37:16.661192067Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 10 00:37:16.663620 kubelet[1438]: E0710 00:37:16.663546 1438 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-76p48" podUID="f42a92fd-7908-4d38-9f25-e2008b563302" Jul 10 00:37:16.663819 env[1200]: time="2025-07-10T00:37:16.663765783Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 10 00:37:16.665054 env[1200]: time="2025-07-10T00:37:16.665027840Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 10 00:37:16.666186 env[1200]: time="2025-07-10T00:37:16.666160675Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 10 00:37:16.685820 env[1200]: time="2025-07-10T00:37:16.685682215Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 10 00:37:16.685820 env[1200]: time="2025-07-10T00:37:16.685740985Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 10 00:37:16.685820 env[1200]: time="2025-07-10T00:37:16.685759079Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 10 00:37:16.686355 env[1200]: time="2025-07-10T00:37:16.686251582Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/a88998c69ebc7ea64d5914ce9e8c49892297d5ef747cf2c605b41de7621e34d8 pid=1508 runtime=io.containerd.runc.v2 Jul 10 00:37:16.692281 env[1200]: time="2025-07-10T00:37:16.692177516Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 10 00:37:16.692397 env[1200]: time="2025-07-10T00:37:16.692284506Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 10 00:37:16.692397 env[1200]: time="2025-07-10T00:37:16.692317168Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 10 00:37:16.692769 env[1200]: time="2025-07-10T00:37:16.692667885Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/3b6bcad8a6d30879e2d51022fe227ff1caaa936d43921f9a3bc64ba68a6b73c7 pid=1510 runtime=io.containerd.runc.v2 Jul 10 00:37:16.701072 systemd[1]: Started cri-containerd-a88998c69ebc7ea64d5914ce9e8c49892297d5ef747cf2c605b41de7621e34d8.scope. Jul 10 00:37:16.706773 systemd[1]: Started cri-containerd-3b6bcad8a6d30879e2d51022fe227ff1caaa936d43921f9a3bc64ba68a6b73c7.scope. Jul 10 00:37:16.713000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:16.713000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:16.713000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:16.713000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:16.713000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:16.713000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:16.713000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:16.713000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:16.713000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:16.713000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:16.713000 audit: BPF prog-id=61 op=LOAD Jul 10 00:37:16.714000 audit[1527]: AVC avc: denied { bpf } for pid=1527 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:16.714000 audit[1527]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=1508 pid=1527 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:37:16.714000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6138383939386336396562633765613634643539313463653965386334 Jul 10 00:37:16.714000 audit[1527]: AVC avc: denied { perfmon } for pid=1527 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:16.714000 audit[1527]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=1508 pid=1527 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:37:16.714000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6138383939386336396562633765613634643539313463653965386334 Jul 10 00:37:16.714000 audit[1527]: AVC avc: denied { bpf } for pid=1527 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:16.714000 audit[1527]: AVC avc: denied { bpf } for pid=1527 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:16.714000 audit[1527]: AVC avc: denied { bpf } for pid=1527 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:16.714000 audit[1527]: AVC avc: denied { perfmon } for pid=1527 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:16.714000 audit[1527]: AVC avc: denied { perfmon } for pid=1527 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:16.714000 audit[1527]: AVC avc: denied { perfmon } for pid=1527 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:16.714000 audit[1527]: AVC avc: denied { perfmon } for pid=1527 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:16.714000 audit[1527]: AVC avc: denied { perfmon } for pid=1527 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:16.714000 audit[1527]: AVC avc: denied { bpf } for pid=1527 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:16.714000 audit[1527]: AVC avc: denied { bpf } for pid=1527 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:16.714000 audit: BPF prog-id=62 op=LOAD Jul 10 00:37:16.714000 audit[1527]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0001df310 items=0 ppid=1508 pid=1527 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:37:16.714000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6138383939386336396562633765613634643539313463653965386334 Jul 10 00:37:16.714000 audit[1527]: AVC avc: denied { bpf } for pid=1527 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:16.714000 audit[1527]: AVC avc: denied { bpf } for pid=1527 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:16.714000 audit[1527]: AVC avc: denied { perfmon } for pid=1527 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:16.714000 audit[1527]: AVC avc: denied { perfmon } for pid=1527 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:16.714000 audit[1527]: AVC avc: denied { perfmon } for pid=1527 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:16.714000 audit[1527]: AVC avc: denied { perfmon } for pid=1527 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:16.714000 audit[1527]: AVC avc: denied { perfmon } for pid=1527 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:16.714000 audit[1527]: AVC avc: denied { bpf } for pid=1527 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:16.714000 audit[1527]: AVC avc: denied { bpf } for pid=1527 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:16.714000 audit: BPF prog-id=63 op=LOAD Jul 10 00:37:16.714000 audit[1527]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0001df358 items=0 ppid=1508 pid=1527 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:37:16.714000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6138383939386336396562633765613634643539313463653965386334 Jul 10 00:37:16.714000 audit: BPF prog-id=63 op=UNLOAD Jul 10 00:37:16.714000 audit: BPF prog-id=62 op=UNLOAD Jul 10 00:37:16.714000 audit[1527]: AVC avc: denied { bpf } for pid=1527 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:16.714000 audit[1527]: AVC avc: denied { bpf } for pid=1527 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:16.714000 audit[1527]: AVC avc: denied { bpf } for pid=1527 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:16.714000 audit[1527]: AVC avc: denied { perfmon } for pid=1527 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:16.714000 audit[1527]: AVC avc: denied { perfmon } for pid=1527 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:16.714000 audit[1527]: AVC avc: denied { perfmon } for pid=1527 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:16.714000 audit[1527]: AVC avc: denied { perfmon } for pid=1527 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:16.714000 audit[1527]: AVC avc: denied { perfmon } for pid=1527 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:16.714000 audit[1527]: AVC avc: denied { bpf } for pid=1527 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:16.714000 audit[1527]: AVC avc: denied { bpf } for pid=1527 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:16.714000 audit: BPF prog-id=64 op=LOAD Jul 10 00:37:16.714000 audit[1527]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0001df768 items=0 ppid=1508 pid=1527 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:37:16.714000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6138383939386336396562633765613634643539313463653965386334 Jul 10 00:37:16.717000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:16.717000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:16.717000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:16.717000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:16.717000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:16.717000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:16.717000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:16.717000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:16.717000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:16.717000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:16.717000 audit: BPF prog-id=65 op=LOAD Jul 10 00:37:16.717000 audit[1535]: AVC avc: denied { bpf } for pid=1535 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:16.717000 audit[1535]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=1510 pid=1535 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:37:16.717000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3362366263616438613664333038373965326435313032326665323237 Jul 10 00:37:16.717000 audit[1535]: AVC avc: denied { perfmon } for pid=1535 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:16.717000 audit[1535]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=1510 pid=1535 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:37:16.717000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3362366263616438613664333038373965326435313032326665323237 Jul 10 00:37:16.717000 audit[1535]: AVC avc: denied { bpf } for pid=1535 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:16.717000 audit[1535]: AVC avc: denied { bpf } for pid=1535 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:16.717000 audit[1535]: AVC avc: denied { bpf } for pid=1535 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:16.717000 audit[1535]: AVC avc: denied { perfmon } for pid=1535 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:16.717000 audit[1535]: AVC avc: denied { perfmon } for pid=1535 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:16.717000 audit[1535]: AVC avc: denied { perfmon } for pid=1535 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:16.717000 audit[1535]: AVC avc: denied { perfmon } for pid=1535 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:16.717000 audit[1535]: AVC avc: denied { perfmon } for pid=1535 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:16.717000 audit[1535]: AVC avc: denied { bpf } for pid=1535 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:16.717000 audit[1535]: AVC avc: denied { bpf } for pid=1535 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:16.717000 audit: BPF prog-id=66 op=LOAD Jul 10 00:37:16.717000 audit[1535]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c00028a350 items=0 ppid=1510 pid=1535 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:37:16.717000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3362366263616438613664333038373965326435313032326665323237 Jul 10 00:37:16.717000 audit[1535]: AVC avc: denied { bpf } for pid=1535 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:16.717000 audit[1535]: AVC avc: denied { bpf } for pid=1535 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:16.717000 audit[1535]: AVC avc: denied { perfmon } for pid=1535 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:16.717000 audit[1535]: AVC avc: denied { perfmon } for pid=1535 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:16.717000 audit[1535]: AVC avc: denied { perfmon } for pid=1535 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:16.717000 audit[1535]: AVC avc: denied { perfmon } for pid=1535 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:16.717000 audit[1535]: AVC avc: denied { perfmon } for pid=1535 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:16.717000 audit[1535]: AVC avc: denied { bpf } for pid=1535 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:16.717000 audit[1535]: AVC avc: denied { bpf } for pid=1535 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:16.717000 audit: BPF prog-id=67 op=LOAD Jul 10 00:37:16.717000 audit[1535]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c00028a398 items=0 ppid=1510 pid=1535 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:37:16.717000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3362366263616438613664333038373965326435313032326665323237 Jul 10 00:37:16.718000 audit: BPF prog-id=67 op=UNLOAD Jul 10 00:37:16.718000 audit: BPF prog-id=66 op=UNLOAD Jul 10 00:37:16.718000 audit[1535]: AVC avc: denied { bpf } for pid=1535 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:16.718000 audit[1535]: AVC avc: denied { bpf } for pid=1535 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:16.718000 audit[1535]: AVC avc: denied { bpf } for pid=1535 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:16.718000 audit[1535]: AVC avc: denied { perfmon } for pid=1535 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:16.718000 audit[1535]: AVC avc: denied { perfmon } for pid=1535 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:16.718000 audit[1535]: AVC avc: denied { perfmon } for pid=1535 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:16.718000 audit[1535]: AVC avc: denied { perfmon } for pid=1535 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:16.718000 audit[1535]: AVC avc: denied { perfmon } for pid=1535 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:16.718000 audit[1535]: AVC avc: denied { bpf } for pid=1535 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:16.718000 audit[1535]: AVC avc: denied { bpf } for pid=1535 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:16.718000 audit: BPF prog-id=68 op=LOAD Jul 10 00:37:16.718000 audit[1535]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c00028a7a8 items=0 ppid=1510 pid=1535 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:37:16.718000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3362366263616438613664333038373965326435313032326665323237 Jul 10 00:37:16.729394 env[1200]: time="2025-07-10T00:37:16.729330391Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-wrm44,Uid:11697040-1678-4250-8332-129c2aee1304,Namespace:calico-system,Attempt:0,} returns sandbox id \"3b6bcad8a6d30879e2d51022fe227ff1caaa936d43921f9a3bc64ba68a6b73c7\"" Jul 10 00:37:16.730007 env[1200]: time="2025-07-10T00:37:16.729978656Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-6h4qb,Uid:c3893254-9bef-44e5-aad9-aac889c79ca9,Namespace:kube-system,Attempt:0,} returns sandbox id \"a88998c69ebc7ea64d5914ce9e8c49892297d5ef747cf2c605b41de7621e34d8\"" Jul 10 00:37:16.731200 kubelet[1438]: E0710 00:37:16.731169 1438 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Jul 10 00:37:16.732108 env[1200]: time="2025-07-10T00:37:16.732068896Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.2\"" Jul 10 00:37:17.234633 kubelet[1438]: E0710 00:37:17.234570 1438 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 00:37:17.932358 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1763301535.mount: Deactivated successfully. Jul 10 00:37:18.046217 env[1200]: time="2025-07-10T00:37:18.046128206Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 10 00:37:18.048166 env[1200]: time="2025-07-10T00:37:18.048094704Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:639615519fa6f7bc4b4756066ba9780068fd291eacc36c120f6c555e62f2b00e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 10 00:37:18.049745 env[1200]: time="2025-07-10T00:37:18.049695486Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 10 00:37:18.051262 env[1200]: time="2025-07-10T00:37:18.051220947Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:972be127eaecd7d1a2d5393b8d14f1ae8f88550bee83e0519e9590c7e15eb41b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 10 00:37:18.051749 env[1200]: time="2025-07-10T00:37:18.051719061Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.2\" returns image reference \"sha256:639615519fa6f7bc4b4756066ba9780068fd291eacc36c120f6c555e62f2b00e\"" Jul 10 00:37:18.052927 env[1200]: time="2025-07-10T00:37:18.052888765Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.32.6\"" Jul 10 00:37:18.054189 env[1200]: time="2025-07-10T00:37:18.054160911Z" level=info msg="CreateContainer within sandbox \"3b6bcad8a6d30879e2d51022fe227ff1caaa936d43921f9a3bc64ba68a6b73c7\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Jul 10 00:37:18.072388 env[1200]: time="2025-07-10T00:37:18.072310407Z" level=info msg="CreateContainer within sandbox \"3b6bcad8a6d30879e2d51022fe227ff1caaa936d43921f9a3bc64ba68a6b73c7\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"a552db8fe8c183bf0d8a477ce75f675598489506402dbf72af9e0da322d74d46\"" Jul 10 00:37:18.073222 env[1200]: time="2025-07-10T00:37:18.073175640Z" level=info msg="StartContainer for \"a552db8fe8c183bf0d8a477ce75f675598489506402dbf72af9e0da322d74d46\"" Jul 10 00:37:18.090052 systemd[1]: Started cri-containerd-a552db8fe8c183bf0d8a477ce75f675598489506402dbf72af9e0da322d74d46.scope. Jul 10 00:37:18.105446 kernel: kauditd_printk_skb: 334 callbacks suppressed Jul 10 00:37:18.105571 kernel: audit: type=1400 audit(1752107838.102:455): avc: denied { perfmon } for pid=1581 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:18.102000 audit[1581]: AVC avc: denied { perfmon } for pid=1581 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:18.102000 audit[1581]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f2a6a1c2448 items=0 ppid=1510 pid=1581 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:37:18.113341 kernel: audit: type=1300 audit(1752107838.102:455): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f2a6a1c2448 items=0 ppid=1510 pid=1581 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:37:18.113398 kernel: audit: type=1327 audit(1752107838.102:455): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6135353264623866653863313833626630643861343737636537356636 Jul 10 00:37:18.102000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6135353264623866653863313833626630643861343737636537356636 Jul 10 00:37:18.117753 kernel: audit: type=1400 audit(1752107838.102:456): avc: denied { bpf } for pid=1581 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:18.102000 audit[1581]: AVC avc: denied { bpf } for pid=1581 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:18.102000 audit[1581]: AVC avc: denied { bpf } for pid=1581 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:18.124215 kernel: audit: type=1400 audit(1752107838.102:456): avc: denied { bpf } for pid=1581 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:18.102000 audit[1581]: AVC avc: denied { bpf } for pid=1581 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:18.127605 kernel: audit: type=1400 audit(1752107838.102:456): avc: denied { bpf } for pid=1581 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:18.127678 kernel: audit: type=1400 audit(1752107838.102:456): avc: denied { perfmon } for pid=1581 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:18.102000 audit[1581]: AVC avc: denied { perfmon } for pid=1581 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:18.134138 kernel: audit: type=1400 audit(1752107838.102:456): avc: denied { perfmon } for pid=1581 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:18.102000 audit[1581]: AVC avc: denied { perfmon } for pid=1581 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:18.102000 audit[1581]: AVC avc: denied { perfmon } for pid=1581 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:18.137191 env[1200]: time="2025-07-10T00:37:18.137152880Z" level=info msg="StartContainer for \"a552db8fe8c183bf0d8a477ce75f675598489506402dbf72af9e0da322d74d46\" returns successfully" Jul 10 00:37:18.137902 kernel: audit: type=1400 audit(1752107838.102:456): avc: denied { perfmon } for pid=1581 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:18.137951 kernel: audit: type=1400 audit(1752107838.102:456): avc: denied { perfmon } for pid=1581 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:18.102000 audit[1581]: AVC avc: denied { perfmon } for pid=1581 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:18.102000 audit[1581]: AVC avc: denied { perfmon } for pid=1581 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:18.102000 audit[1581]: AVC avc: denied { bpf } for pid=1581 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:18.102000 audit[1581]: AVC avc: denied { bpf } for pid=1581 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:18.102000 audit: BPF prog-id=69 op=LOAD Jul 10 00:37:18.102000 audit[1581]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c00031bf58 items=0 ppid=1510 pid=1581 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:37:18.102000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6135353264623866653863313833626630643861343737636537356636 Jul 10 00:37:18.106000 audit[1581]: AVC avc: denied { bpf } for pid=1581 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:18.106000 audit[1581]: AVC avc: denied { bpf } for pid=1581 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:18.106000 audit[1581]: AVC avc: denied { perfmon } for pid=1581 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:18.106000 audit[1581]: AVC avc: denied { perfmon } for pid=1581 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:18.106000 audit[1581]: AVC avc: denied { perfmon } for pid=1581 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:18.106000 audit[1581]: AVC avc: denied { perfmon } for pid=1581 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:18.106000 audit[1581]: AVC avc: denied { perfmon } for pid=1581 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:18.106000 audit[1581]: AVC avc: denied { bpf } for pid=1581 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:18.106000 audit[1581]: AVC avc: denied { bpf } for pid=1581 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:18.106000 audit: BPF prog-id=70 op=LOAD Jul 10 00:37:18.106000 audit[1581]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c00031bfa8 items=0 ppid=1510 pid=1581 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:37:18.106000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6135353264623866653863313833626630643861343737636537356636 Jul 10 00:37:18.117000 audit: BPF prog-id=70 op=UNLOAD Jul 10 00:37:18.117000 audit: BPF prog-id=69 op=UNLOAD Jul 10 00:37:18.117000 audit[1581]: AVC avc: denied { bpf } for pid=1581 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:18.117000 audit[1581]: AVC avc: denied { bpf } for pid=1581 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:18.117000 audit[1581]: AVC avc: denied { bpf } for pid=1581 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:18.117000 audit[1581]: AVC avc: denied { perfmon } for pid=1581 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:18.117000 audit[1581]: AVC avc: denied { perfmon } for pid=1581 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:18.117000 audit[1581]: AVC avc: denied { perfmon } for pid=1581 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:18.117000 audit[1581]: AVC avc: denied { perfmon } for pid=1581 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:18.117000 audit[1581]: AVC avc: denied { perfmon } for pid=1581 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:18.117000 audit[1581]: AVC avc: denied { bpf } for pid=1581 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:18.117000 audit[1581]: AVC avc: denied { bpf } for pid=1581 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:18.117000 audit: BPF prog-id=71 op=LOAD Jul 10 00:37:18.117000 audit[1581]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c000352038 items=0 ppid=1510 pid=1581 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:37:18.117000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6135353264623866653863313833626630643861343737636537356636 Jul 10 00:37:18.148687 systemd[1]: cri-containerd-a552db8fe8c183bf0d8a477ce75f675598489506402dbf72af9e0da322d74d46.scope: Deactivated successfully. Jul 10 00:37:18.153000 audit: BPF prog-id=71 op=UNLOAD Jul 10 00:37:18.235726 kubelet[1438]: E0710 00:37:18.235608 1438 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 00:37:18.237424 env[1200]: time="2025-07-10T00:37:18.237355135Z" level=info msg="shim disconnected" id=a552db8fe8c183bf0d8a477ce75f675598489506402dbf72af9e0da322d74d46 Jul 10 00:37:18.237504 env[1200]: time="2025-07-10T00:37:18.237427741Z" level=warning msg="cleaning up after shim disconnected" id=a552db8fe8c183bf0d8a477ce75f675598489506402dbf72af9e0da322d74d46 namespace=k8s.io Jul 10 00:37:18.237504 env[1200]: time="2025-07-10T00:37:18.237438682Z" level=info msg="cleaning up dead shim" Jul 10 00:37:18.245094 env[1200]: time="2025-07-10T00:37:18.245056157Z" level=warning msg="cleanup warnings time=\"2025-07-10T00:37:18Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=1620 runtime=io.containerd.runc.v2\n" Jul 10 00:37:18.662869 kubelet[1438]: E0710 00:37:18.662732 1438 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-76p48" podUID="f42a92fd-7908-4d38-9f25-e2008b563302" Jul 10 00:37:19.236195 kubelet[1438]: E0710 00:37:19.236137 1438 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 00:37:19.780439 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3793049053.mount: Deactivated successfully. Jul 10 00:37:20.237197 kubelet[1438]: E0710 00:37:20.237048 1438 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 00:37:20.397607 env[1200]: time="2025-07-10T00:37:20.397539893Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.32.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 10 00:37:20.399276 env[1200]: time="2025-07-10T00:37:20.399245872Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:63f0cbe3b7339c5d006efc9964228e48271bae73039320037c451b5e8f763e02,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 10 00:37:20.400963 env[1200]: time="2025-07-10T00:37:20.400902749Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.32.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 10 00:37:20.402388 env[1200]: time="2025-07-10T00:37:20.402329585Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:b13d9da413b983d130bf090b83fce12e1ccc704e95f366da743c18e964d9d7e9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 10 00:37:20.402816 env[1200]: time="2025-07-10T00:37:20.402781382Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.32.6\" returns image reference \"sha256:63f0cbe3b7339c5d006efc9964228e48271bae73039320037c451b5e8f763e02\"" Jul 10 00:37:20.403835 env[1200]: time="2025-07-10T00:37:20.403806435Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.30.2\"" Jul 10 00:37:20.405090 env[1200]: time="2025-07-10T00:37:20.405048875Z" level=info msg="CreateContainer within sandbox \"a88998c69ebc7ea64d5914ce9e8c49892297d5ef747cf2c605b41de7621e34d8\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Jul 10 00:37:20.418652 env[1200]: time="2025-07-10T00:37:20.418582786Z" level=info msg="CreateContainer within sandbox \"a88998c69ebc7ea64d5914ce9e8c49892297d5ef747cf2c605b41de7621e34d8\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"4364ea36eaa4d9ad4d2e6604f460747727da03bc8aa88eb906a3c22ee79e2775\"" Jul 10 00:37:20.419016 env[1200]: time="2025-07-10T00:37:20.418980031Z" level=info msg="StartContainer for \"4364ea36eaa4d9ad4d2e6604f460747727da03bc8aa88eb906a3c22ee79e2775\"" Jul 10 00:37:20.434573 systemd[1]: Started cri-containerd-4364ea36eaa4d9ad4d2e6604f460747727da03bc8aa88eb906a3c22ee79e2775.scope. Jul 10 00:37:20.445000 audit[1646]: AVC avc: denied { perfmon } for pid=1646 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:20.445000 audit[1646]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7fdb5c267cf8 items=0 ppid=1508 pid=1646 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:37:20.445000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3433363465613336656161346439616434643265363630346634363037 Jul 10 00:37:20.445000 audit[1646]: AVC avc: denied { bpf } for pid=1646 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:20.445000 audit[1646]: AVC avc: denied { bpf } for pid=1646 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:20.445000 audit[1646]: AVC avc: denied { bpf } for pid=1646 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:20.445000 audit[1646]: AVC avc: denied { perfmon } for pid=1646 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:20.445000 audit[1646]: AVC avc: denied { perfmon } for pid=1646 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:20.445000 audit[1646]: AVC avc: denied { perfmon } for pid=1646 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:20.445000 audit[1646]: AVC avc: denied { perfmon } for pid=1646 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:20.445000 audit[1646]: AVC avc: denied { perfmon } for pid=1646 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:20.445000 audit[1646]: AVC avc: denied { bpf } for pid=1646 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:20.445000 audit[1646]: AVC avc: denied { bpf } for pid=1646 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:20.445000 audit: BPF prog-id=72 op=LOAD Jul 10 00:37:20.445000 audit[1646]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c000097178 items=0 ppid=1508 pid=1646 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:37:20.445000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3433363465613336656161346439616434643265363630346634363037 Jul 10 00:37:20.445000 audit[1646]: AVC avc: denied { bpf } for pid=1646 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:20.445000 audit[1646]: AVC avc: denied { bpf } for pid=1646 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:20.445000 audit[1646]: AVC avc: denied { perfmon } for pid=1646 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:20.445000 audit[1646]: AVC avc: denied { perfmon } for pid=1646 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:20.445000 audit[1646]: AVC avc: denied { perfmon } for pid=1646 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:20.445000 audit[1646]: AVC avc: denied { perfmon } for pid=1646 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:20.445000 audit[1646]: AVC avc: denied { perfmon } for pid=1646 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:20.445000 audit[1646]: AVC avc: denied { bpf } for pid=1646 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:20.445000 audit[1646]: AVC avc: denied { bpf } for pid=1646 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:20.445000 audit: BPF prog-id=73 op=LOAD Jul 10 00:37:20.445000 audit[1646]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0000971c8 items=0 ppid=1508 pid=1646 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:37:20.445000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3433363465613336656161346439616434643265363630346634363037 Jul 10 00:37:20.445000 audit: BPF prog-id=73 op=UNLOAD Jul 10 00:37:20.445000 audit: BPF prog-id=72 op=UNLOAD Jul 10 00:37:20.445000 audit[1646]: AVC avc: denied { bpf } for pid=1646 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:20.445000 audit[1646]: AVC avc: denied { bpf } for pid=1646 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:20.445000 audit[1646]: AVC avc: denied { bpf } for pid=1646 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:20.445000 audit[1646]: AVC avc: denied { perfmon } for pid=1646 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:20.445000 audit[1646]: AVC avc: denied { perfmon } for pid=1646 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:20.445000 audit[1646]: AVC avc: denied { perfmon } for pid=1646 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:20.445000 audit[1646]: AVC avc: denied { perfmon } for pid=1646 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:20.445000 audit[1646]: AVC avc: denied { perfmon } for pid=1646 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:20.445000 audit[1646]: AVC avc: denied { bpf } for pid=1646 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:20.445000 audit[1646]: AVC avc: denied { bpf } for pid=1646 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:20.445000 audit: BPF prog-id=74 op=LOAD Jul 10 00:37:20.445000 audit[1646]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c000097258 items=0 ppid=1508 pid=1646 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:37:20.445000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3433363465613336656161346439616434643265363630346634363037 Jul 10 00:37:20.459566 env[1200]: time="2025-07-10T00:37:20.459514647Z" level=info msg="StartContainer for \"4364ea36eaa4d9ad4d2e6604f460747727da03bc8aa88eb906a3c22ee79e2775\" returns successfully" Jul 10 00:37:20.555000 audit[1706]: NETFILTER_CFG table=mangle:14 family=2 entries=1 op=nft_register_chain pid=1706 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 10 00:37:20.555000 audit[1706]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe61836fe0 a2=0 a3=7ffe61836fcc items=0 ppid=1656 pid=1706 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:37:20.555000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Jul 10 00:37:20.555000 audit[1707]: NETFILTER_CFG table=mangle:15 family=10 entries=1 op=nft_register_chain pid=1707 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 10 00:37:20.555000 audit[1707]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc11c107f0 a2=0 a3=7ffc11c107dc items=0 ppid=1656 pid=1707 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:37:20.555000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Jul 10 00:37:20.556000 audit[1708]: NETFILTER_CFG table=nat:16 family=2 entries=1 op=nft_register_chain pid=1708 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 10 00:37:20.556000 audit[1708]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe100ae5a0 a2=0 a3=7ffe100ae58c items=0 ppid=1656 pid=1708 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:37:20.556000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Jul 10 00:37:20.556000 audit[1709]: NETFILTER_CFG table=nat:17 family=10 entries=1 op=nft_register_chain pid=1709 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 10 00:37:20.556000 audit[1709]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffcec7744b0 a2=0 a3=7ffcec77449c items=0 ppid=1656 pid=1709 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:37:20.556000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Jul 10 00:37:20.557000 audit[1710]: NETFILTER_CFG table=filter:18 family=2 entries=1 op=nft_register_chain pid=1710 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 10 00:37:20.557000 audit[1710]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffdf799b580 a2=0 a3=7ffdf799b56c items=0 ppid=1656 pid=1710 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:37:20.557000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Jul 10 00:37:20.557000 audit[1711]: NETFILTER_CFG table=filter:19 family=10 entries=1 op=nft_register_chain pid=1711 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 10 00:37:20.557000 audit[1711]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffdfa4ce180 a2=0 a3=7ffdfa4ce16c items=0 ppid=1656 pid=1711 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:37:20.557000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Jul 10 00:37:20.658000 audit[1713]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_chain pid=1713 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 10 00:37:20.658000 audit[1713]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffd90bfb4b0 a2=0 a3=7ffd90bfb49c items=0 ppid=1656 pid=1713 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:37:20.658000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Jul 10 00:37:20.660000 audit[1715]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=1715 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 10 00:37:20.660000 audit[1715]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffde5b8e890 a2=0 a3=7ffde5b8e87c items=0 ppid=1656 pid=1715 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:37:20.660000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Jul 10 00:37:20.663389 kubelet[1438]: E0710 00:37:20.663352 1438 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-76p48" podUID="f42a92fd-7908-4d38-9f25-e2008b563302" Jul 10 00:37:20.664000 audit[1718]: NETFILTER_CFG table=filter:22 family=2 entries=2 op=nft_register_chain pid=1718 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 10 00:37:20.664000 audit[1718]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffe562a6dd0 a2=0 a3=7ffe562a6dbc items=0 ppid=1656 pid=1718 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:37:20.664000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Jul 10 00:37:20.665000 audit[1719]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_chain pid=1719 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 10 00:37:20.665000 audit[1719]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe315d51b0 a2=0 a3=7ffe315d519c items=0 ppid=1656 pid=1719 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:37:20.665000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Jul 10 00:37:20.667000 audit[1721]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_register_rule pid=1721 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 10 00:37:20.667000 audit[1721]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7fffd652d860 a2=0 a3=7fffd652d84c items=0 ppid=1656 pid=1721 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:37:20.667000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Jul 10 00:37:20.668000 audit[1722]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_chain pid=1722 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 10 00:37:20.668000 audit[1722]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd76ebe8c0 a2=0 a3=7ffd76ebe8ac items=0 ppid=1656 pid=1722 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:37:20.668000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Jul 10 00:37:20.670000 audit[1724]: NETFILTER_CFG table=filter:26 family=2 entries=1 op=nft_register_rule pid=1724 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 10 00:37:20.670000 audit[1724]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffc94bde5d0 a2=0 a3=7ffc94bde5bc items=0 ppid=1656 pid=1724 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:37:20.670000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Jul 10 00:37:20.673000 audit[1727]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_rule pid=1727 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 10 00:37:20.673000 audit[1727]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffe9eb63e90 a2=0 a3=7ffe9eb63e7c items=0 ppid=1656 pid=1727 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:37:20.673000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 Jul 10 00:37:20.674000 audit[1728]: NETFILTER_CFG table=filter:28 family=2 entries=1 op=nft_register_chain pid=1728 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 10 00:37:20.674000 audit[1728]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffcdbd49e20 a2=0 a3=7ffcdbd49e0c items=0 ppid=1656 pid=1728 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:37:20.674000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Jul 10 00:37:20.677330 kubelet[1438]: E0710 00:37:20.677294 1438 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Jul 10 00:37:20.677000 audit[1730]: NETFILTER_CFG table=filter:29 family=2 entries=1 op=nft_register_rule pid=1730 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 10 00:37:20.677000 audit[1730]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffd53ec5bd0 a2=0 a3=7ffd53ec5bbc items=0 ppid=1656 pid=1730 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:37:20.677000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Jul 10 00:37:20.678000 audit[1731]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_chain pid=1731 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 10 00:37:20.678000 audit[1731]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffec7fda030 a2=0 a3=7ffec7fda01c items=0 ppid=1656 pid=1731 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:37:20.678000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Jul 10 00:37:20.681000 audit[1733]: NETFILTER_CFG table=filter:31 family=2 entries=1 op=nft_register_rule pid=1733 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 10 00:37:20.681000 audit[1733]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffe927b3c40 a2=0 a3=7ffe927b3c2c items=0 ppid=1656 pid=1733 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:37:20.681000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Jul 10 00:37:20.684000 audit[1736]: NETFILTER_CFG table=filter:32 family=2 entries=1 op=nft_register_rule pid=1736 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 10 00:37:20.684000 audit[1736]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffcf51c9250 a2=0 a3=7ffcf51c923c items=0 ppid=1656 pid=1736 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:37:20.684000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Jul 10 00:37:20.687786 kubelet[1438]: I0710 00:37:20.687656 1438 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-proxy-6h4qb" podStartSLOduration=3.015895363 podStartE2EDuration="6.687613194s" podCreationTimestamp="2025-07-10 00:37:14 +0000 UTC" firstStartedPulling="2025-07-10 00:37:16.731917222 +0000 UTC m=+4.160121434" lastFinishedPulling="2025-07-10 00:37:20.403635053 +0000 UTC m=+7.831839265" observedRunningTime="2025-07-10 00:37:20.687548803 +0000 UTC m=+8.115753025" watchObservedRunningTime="2025-07-10 00:37:20.687613194 +0000 UTC m=+8.115817406" Jul 10 00:37:20.687000 audit[1739]: NETFILTER_CFG table=filter:33 family=2 entries=1 op=nft_register_rule pid=1739 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 10 00:37:20.687000 audit[1739]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffcee106d80 a2=0 a3=7ffcee106d6c items=0 ppid=1656 pid=1739 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:37:20.687000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Jul 10 00:37:20.688000 audit[1740]: NETFILTER_CFG table=nat:34 family=2 entries=1 op=nft_register_chain pid=1740 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 10 00:37:20.688000 audit[1740]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffd545b0840 a2=0 a3=7ffd545b082c items=0 ppid=1656 pid=1740 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:37:20.688000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Jul 10 00:37:20.690000 audit[1742]: NETFILTER_CFG table=nat:35 family=2 entries=2 op=nft_register_chain pid=1742 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 10 00:37:20.690000 audit[1742]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffd98c8c540 a2=0 a3=7ffd98c8c52c items=0 ppid=1656 pid=1742 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:37:20.690000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Jul 10 00:37:20.714000 audit[1746]: NETFILTER_CFG table=nat:36 family=2 entries=2 op=nft_register_chain pid=1746 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 10 00:37:20.714000 audit[1746]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffeade7bd90 a2=0 a3=7ffeade7bd7c items=0 ppid=1656 pid=1746 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:37:20.714000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Jul 10 00:37:20.714000 audit[1747]: NETFILTER_CFG table=nat:37 family=2 entries=1 op=nft_register_chain pid=1747 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 10 00:37:20.714000 audit[1747]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffda4636c90 a2=0 a3=7ffda4636c7c items=0 ppid=1656 pid=1747 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:37:20.714000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Jul 10 00:37:20.717000 audit[1749]: NETFILTER_CFG table=nat:38 family=2 entries=2 op=nft_register_chain pid=1749 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 10 00:37:20.717000 audit[1749]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffe4351c940 a2=0 a3=7ffe4351c92c items=0 ppid=1656 pid=1749 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:37:20.717000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Jul 10 00:37:20.740000 audit[1755]: NETFILTER_CFG table=filter:39 family=2 entries=11 op=nft_register_rule pid=1755 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 10 00:37:20.740000 audit[1755]: SYSCALL arch=c000003e syscall=46 success=yes exit=7480 a0=3 a1=7ffca94e0e20 a2=0 a3=7ffca94e0e0c items=0 ppid=1656 pid=1755 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:37:20.740000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 10 00:37:20.757000 audit[1755]: NETFILTER_CFG table=nat:40 family=2 entries=21 op=nft_register_chain pid=1755 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 10 00:37:20.757000 audit[1755]: SYSCALL arch=c000003e syscall=46 success=yes exit=9084 a0=3 a1=7ffca94e0e20 a2=0 a3=7ffca94e0e0c items=0 ppid=1656 pid=1755 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:37:20.757000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 10 00:37:20.759000 audit[1762]: NETFILTER_CFG table=filter:41 family=10 entries=1 op=nft_register_chain pid=1762 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 10 00:37:20.759000 audit[1762]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffda62115b0 a2=0 a3=7ffda621159c items=0 ppid=1656 pid=1762 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:37:20.759000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Jul 10 00:37:20.761000 audit[1764]: NETFILTER_CFG table=filter:42 family=10 entries=2 op=nft_register_chain pid=1764 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 10 00:37:20.761000 audit[1764]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffdb046ee70 a2=0 a3=7ffdb046ee5c items=0 ppid=1656 pid=1764 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:37:20.761000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 Jul 10 00:37:20.764000 audit[1767]: NETFILTER_CFG table=filter:43 family=10 entries=2 op=nft_register_chain pid=1767 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 10 00:37:20.764000 audit[1767]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffcbd97e3c0 a2=0 a3=7ffcbd97e3ac items=0 ppid=1656 pid=1767 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:37:20.764000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 Jul 10 00:37:20.765000 audit[1768]: NETFILTER_CFG table=filter:44 family=10 entries=1 op=nft_register_chain pid=1768 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 10 00:37:20.765000 audit[1768]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd35e8b620 a2=0 a3=7ffd35e8b60c items=0 ppid=1656 pid=1768 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:37:20.765000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Jul 10 00:37:20.767000 audit[1770]: NETFILTER_CFG table=filter:45 family=10 entries=1 op=nft_register_rule pid=1770 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 10 00:37:20.767000 audit[1770]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7fffae1824e0 a2=0 a3=7fffae1824cc items=0 ppid=1656 pid=1770 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:37:20.767000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Jul 10 00:37:20.768000 audit[1771]: NETFILTER_CFG table=filter:46 family=10 entries=1 op=nft_register_chain pid=1771 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 10 00:37:20.768000 audit[1771]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffcd452ec50 a2=0 a3=7ffcd452ec3c items=0 ppid=1656 pid=1771 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:37:20.768000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Jul 10 00:37:20.770000 audit[1773]: NETFILTER_CFG table=filter:47 family=10 entries=1 op=nft_register_rule pid=1773 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 10 00:37:20.770000 audit[1773]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffcf668f360 a2=0 a3=7ffcf668f34c items=0 ppid=1656 pid=1773 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:37:20.770000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 Jul 10 00:37:20.773000 audit[1776]: NETFILTER_CFG table=filter:48 family=10 entries=2 op=nft_register_chain pid=1776 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 10 00:37:20.773000 audit[1776]: SYSCALL arch=c000003e syscall=46 success=yes exit=828 a0=3 a1=7ffd00eafd00 a2=0 a3=7ffd00eafcec items=0 ppid=1656 pid=1776 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:37:20.773000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Jul 10 00:37:20.774000 audit[1777]: NETFILTER_CFG table=filter:49 family=10 entries=1 op=nft_register_chain pid=1777 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 10 00:37:20.774000 audit[1777]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffcf10e7410 a2=0 a3=7ffcf10e73fc items=0 ppid=1656 pid=1777 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:37:20.774000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Jul 10 00:37:20.776000 audit[1779]: NETFILTER_CFG table=filter:50 family=10 entries=1 op=nft_register_rule pid=1779 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 10 00:37:20.776000 audit[1779]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffe64df8480 a2=0 a3=7ffe64df846c items=0 ppid=1656 pid=1779 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:37:20.776000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Jul 10 00:37:20.777000 audit[1780]: NETFILTER_CFG table=filter:51 family=10 entries=1 op=nft_register_chain pid=1780 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 10 00:37:20.777000 audit[1780]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd6afab6a0 a2=0 a3=7ffd6afab68c items=0 ppid=1656 pid=1780 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:37:20.777000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Jul 10 00:37:20.779000 audit[1782]: NETFILTER_CFG table=filter:52 family=10 entries=1 op=nft_register_rule pid=1782 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 10 00:37:20.779000 audit[1782]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffdf29a92b0 a2=0 a3=7ffdf29a929c items=0 ppid=1656 pid=1782 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:37:20.779000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Jul 10 00:37:20.782000 audit[1785]: NETFILTER_CFG table=filter:53 family=10 entries=1 op=nft_register_rule pid=1785 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 10 00:37:20.782000 audit[1785]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffdf3fdf000 a2=0 a3=7ffdf3fdefec items=0 ppid=1656 pid=1785 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:37:20.782000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Jul 10 00:37:20.785000 audit[1788]: NETFILTER_CFG table=filter:54 family=10 entries=1 op=nft_register_rule pid=1788 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 10 00:37:20.785000 audit[1788]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fff49a2a650 a2=0 a3=7fff49a2a63c items=0 ppid=1656 pid=1788 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:37:20.785000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C Jul 10 00:37:20.785000 audit[1789]: NETFILTER_CFG table=nat:55 family=10 entries=1 op=nft_register_chain pid=1789 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 10 00:37:20.785000 audit[1789]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffd0116d5e0 a2=0 a3=7ffd0116d5cc items=0 ppid=1656 pid=1789 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:37:20.785000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Jul 10 00:37:20.787000 audit[1791]: NETFILTER_CFG table=nat:56 family=10 entries=2 op=nft_register_chain pid=1791 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 10 00:37:20.787000 audit[1791]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7fff2c0b4330 a2=0 a3=7fff2c0b431c items=0 ppid=1656 pid=1791 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:37:20.787000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Jul 10 00:37:20.790000 audit[1794]: NETFILTER_CFG table=nat:57 family=10 entries=2 op=nft_register_chain pid=1794 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 10 00:37:20.790000 audit[1794]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7fff4c059170 a2=0 a3=7fff4c05915c items=0 ppid=1656 pid=1794 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:37:20.790000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Jul 10 00:37:20.791000 audit[1795]: NETFILTER_CFG table=nat:58 family=10 entries=1 op=nft_register_chain pid=1795 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 10 00:37:20.791000 audit[1795]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffda00226f0 a2=0 a3=7ffda00226dc items=0 ppid=1656 pid=1795 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:37:20.791000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Jul 10 00:37:20.793000 audit[1797]: NETFILTER_CFG table=nat:59 family=10 entries=2 op=nft_register_chain pid=1797 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 10 00:37:20.793000 audit[1797]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffdc57748f0 a2=0 a3=7ffdc57748dc items=0 ppid=1656 pid=1797 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:37:20.793000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Jul 10 00:37:20.794000 audit[1798]: NETFILTER_CFG table=filter:60 family=10 entries=1 op=nft_register_chain pid=1798 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 10 00:37:20.794000 audit[1798]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc031198f0 a2=0 a3=7ffc031198dc items=0 ppid=1656 pid=1798 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:37:20.794000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Jul 10 00:37:20.796000 audit[1800]: NETFILTER_CFG table=filter:61 family=10 entries=1 op=nft_register_rule pid=1800 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 10 00:37:20.796000 audit[1800]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7fffe098e530 a2=0 a3=7fffe098e51c items=0 ppid=1656 pid=1800 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:37:20.796000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Jul 10 00:37:20.799000 audit[1803]: NETFILTER_CFG table=filter:62 family=10 entries=1 op=nft_register_rule pid=1803 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 10 00:37:20.799000 audit[1803]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffc49ba00f0 a2=0 a3=7ffc49ba00dc items=0 ppid=1656 pid=1803 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:37:20.799000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Jul 10 00:37:20.801000 audit[1805]: NETFILTER_CFG table=filter:63 family=10 entries=3 op=nft_register_rule pid=1805 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Jul 10 00:37:20.801000 audit[1805]: SYSCALL arch=c000003e syscall=46 success=yes exit=2088 a0=3 a1=7fff30d73350 a2=0 a3=7fff30d7333c items=0 ppid=1656 pid=1805 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:37:20.801000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 10 00:37:20.802000 audit[1805]: NETFILTER_CFG table=nat:64 family=10 entries=7 op=nft_register_chain pid=1805 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Jul 10 00:37:20.802000 audit[1805]: SYSCALL arch=c000003e syscall=46 success=yes exit=2056 a0=3 a1=7fff30d73350 a2=0 a3=7fff30d7333c items=0 ppid=1656 pid=1805 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:37:20.802000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 10 00:37:21.238280 kubelet[1438]: E0710 00:37:21.238214 1438 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 00:37:21.678269 kubelet[1438]: E0710 00:37:21.678149 1438 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Jul 10 00:37:22.161000 audit[1807]: NETFILTER_CFG table=filter:65 family=2 entries=19 op=nft_register_rule pid=1807 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 10 00:37:22.161000 audit[1807]: SYSCALL arch=c000003e syscall=46 success=yes exit=6736 a0=3 a1=7ffd2d9287e0 a2=0 a3=7ffd2d9287cc items=0 ppid=1656 pid=1807 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:37:22.161000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 10 00:37:22.165000 audit[1807]: NETFILTER_CFG table=nat:66 family=2 entries=21 op=nft_register_chain pid=1807 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 10 00:37:22.165000 audit[1807]: SYSCALL arch=c000003e syscall=46 success=yes exit=7044 a0=3 a1=7ffd2d9287e0 a2=0 a3=7ffd2d9287cc items=0 ppid=1656 pid=1807 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:37:22.165000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 10 00:37:22.238607 kubelet[1438]: E0710 00:37:22.238533 1438 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 00:37:22.662866 kubelet[1438]: E0710 00:37:22.662733 1438 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-76p48" podUID="f42a92fd-7908-4d38-9f25-e2008b563302" Jul 10 00:37:23.113000 audit[1809]: NETFILTER_CFG table=filter:67 family=2 entries=18 op=nft_register_rule pid=1809 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 10 00:37:23.115911 kernel: kauditd_printk_skb: 236 callbacks suppressed Jul 10 00:37:23.115986 kernel: audit: type=1325 audit(1752107843.113:521): table=filter:67 family=2 entries=18 op=nft_register_rule pid=1809 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 10 00:37:23.113000 audit[1809]: SYSCALL arch=c000003e syscall=46 success=yes exit=6736 a0=3 a1=7ffd648123c0 a2=0 a3=7ffd648123ac items=0 ppid=1656 pid=1809 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:37:23.122444 kernel: audit: type=1300 audit(1752107843.113:521): arch=c000003e syscall=46 success=yes exit=6736 a0=3 a1=7ffd648123c0 a2=0 a3=7ffd648123ac items=0 ppid=1656 pid=1809 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:37:23.122492 kernel: audit: type=1327 audit(1752107843.113:521): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 10 00:37:23.113000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 10 00:37:23.124000 audit[1809]: NETFILTER_CFG table=nat:68 family=2 entries=16 op=nft_register_rule pid=1809 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 10 00:37:23.124000 audit[1809]: SYSCALL arch=c000003e syscall=46 success=yes exit=4236 a0=3 a1=7ffd648123c0 a2=0 a3=0 items=0 ppid=1656 pid=1809 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:37:23.134490 kernel: audit: type=1325 audit(1752107843.124:522): table=nat:68 family=2 entries=16 op=nft_register_rule pid=1809 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 10 00:37:23.134551 kernel: audit: type=1300 audit(1752107843.124:522): arch=c000003e syscall=46 success=yes exit=4236 a0=3 a1=7ffd648123c0 a2=0 a3=0 items=0 ppid=1656 pid=1809 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:37:23.134570 kernel: audit: type=1327 audit(1752107843.124:522): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 10 00:37:23.124000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 10 00:37:23.239578 kubelet[1438]: E0710 00:37:23.239509 1438 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 00:37:23.945460 env[1200]: time="2025-07-10T00:37:23.945367376Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.30.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 10 00:37:23.947728 env[1200]: time="2025-07-10T00:37:23.947663101Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:77a357d0d33e3016e61153f7d2b7de72371579c4aaeb767fb7ef0af606fe1630,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 10 00:37:23.949555 env[1200]: time="2025-07-10T00:37:23.949493153Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.30.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 10 00:37:23.950953 env[1200]: time="2025-07-10T00:37:23.950927563Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:50686775cc60acb78bd92a66fa2d84e1700b2d8e43a718fbadbf35e59baefb4d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 10 00:37:23.951732 env[1200]: time="2025-07-10T00:37:23.951653424Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.30.2\" returns image reference \"sha256:77a357d0d33e3016e61153f7d2b7de72371579c4aaeb767fb7ef0af606fe1630\"" Jul 10 00:37:23.954850 env[1200]: time="2025-07-10T00:37:23.954808020Z" level=info msg="CreateContainer within sandbox \"3b6bcad8a6d30879e2d51022fe227ff1caaa936d43921f9a3bc64ba68a6b73c7\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Jul 10 00:37:23.971752 env[1200]: time="2025-07-10T00:37:23.971657759Z" level=info msg="CreateContainer within sandbox \"3b6bcad8a6d30879e2d51022fe227ff1caaa936d43921f9a3bc64ba68a6b73c7\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"713abff53554e54842556b0d760ea65f5fee2ffd1dc7b0528d624def42ef381b\"" Jul 10 00:37:23.972138 env[1200]: time="2025-07-10T00:37:23.972086624Z" level=info msg="StartContainer for \"713abff53554e54842556b0d760ea65f5fee2ffd1dc7b0528d624def42ef381b\"" Jul 10 00:37:23.991997 systemd[1]: Started cri-containerd-713abff53554e54842556b0d760ea65f5fee2ffd1dc7b0528d624def42ef381b.scope. Jul 10 00:37:24.005000 audit[1818]: AVC avc: denied { perfmon } for pid=1818 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:24.005000 audit[1818]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00019f6b0 a2=3c a3=7f729e00aef8 items=0 ppid=1510 pid=1818 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:37:24.015849 kernel: audit: type=1400 audit(1752107844.005:523): avc: denied { perfmon } for pid=1818 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:24.015913 kernel: audit: type=1300 audit(1752107844.005:523): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00019f6b0 a2=3c a3=7f729e00aef8 items=0 ppid=1510 pid=1818 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:37:24.015938 kernel: audit: type=1327 audit(1752107844.005:523): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3731336162666635333535346535343834323535366230643736306561 Jul 10 00:37:24.005000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3731336162666635333535346535343834323535366230643736306561 Jul 10 00:37:24.020686 kernel: audit: type=1400 audit(1752107844.005:524): avc: denied { bpf } for pid=1818 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:24.005000 audit[1818]: AVC avc: denied { bpf } for pid=1818 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:24.005000 audit[1818]: AVC avc: denied { bpf } for pid=1818 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:24.005000 audit[1818]: AVC avc: denied { bpf } for pid=1818 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:24.005000 audit[1818]: AVC avc: denied { perfmon } for pid=1818 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:24.005000 audit[1818]: AVC avc: denied { perfmon } for pid=1818 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:24.005000 audit[1818]: AVC avc: denied { perfmon } for pid=1818 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:24.005000 audit[1818]: AVC avc: denied { perfmon } for pid=1818 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:24.005000 audit[1818]: AVC avc: denied { perfmon } for pid=1818 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:24.005000 audit[1818]: AVC avc: denied { bpf } for pid=1818 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:24.005000 audit[1818]: AVC avc: denied { bpf } for pid=1818 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:24.005000 audit: BPF prog-id=75 op=LOAD Jul 10 00:37:24.005000 audit[1818]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00019f9d8 a2=78 a3=c0001ff448 items=0 ppid=1510 pid=1818 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:37:24.005000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3731336162666635333535346535343834323535366230643736306561 Jul 10 00:37:24.008000 audit[1818]: AVC avc: denied { bpf } for pid=1818 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:24.008000 audit[1818]: AVC avc: denied { bpf } for pid=1818 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:24.008000 audit[1818]: AVC avc: denied { perfmon } for pid=1818 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:24.008000 audit[1818]: AVC avc: denied { perfmon } for pid=1818 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:24.008000 audit[1818]: AVC avc: denied { perfmon } for pid=1818 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:24.008000 audit[1818]: AVC avc: denied { perfmon } for pid=1818 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:24.008000 audit[1818]: AVC avc: denied { perfmon } for pid=1818 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:24.008000 audit[1818]: AVC avc: denied { bpf } for pid=1818 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:24.008000 audit[1818]: AVC avc: denied { bpf } for pid=1818 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:24.008000 audit: BPF prog-id=76 op=LOAD Jul 10 00:37:24.008000 audit[1818]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00019f770 a2=78 a3=c0001ff498 items=0 ppid=1510 pid=1818 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:37:24.008000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3731336162666635333535346535343834323535366230643736306561 Jul 10 00:37:24.014000 audit: BPF prog-id=76 op=UNLOAD Jul 10 00:37:24.014000 audit: BPF prog-id=75 op=UNLOAD Jul 10 00:37:24.014000 audit[1818]: AVC avc: denied { bpf } for pid=1818 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:24.014000 audit[1818]: AVC avc: denied { bpf } for pid=1818 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:24.014000 audit[1818]: AVC avc: denied { bpf } for pid=1818 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:24.014000 audit[1818]: AVC avc: denied { perfmon } for pid=1818 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:24.014000 audit[1818]: AVC avc: denied { perfmon } for pid=1818 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:24.014000 audit[1818]: AVC avc: denied { perfmon } for pid=1818 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:24.014000 audit[1818]: AVC avc: denied { perfmon } for pid=1818 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:24.014000 audit[1818]: AVC avc: denied { perfmon } for pid=1818 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:24.014000 audit[1818]: AVC avc: denied { bpf } for pid=1818 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:24.014000 audit[1818]: AVC avc: denied { bpf } for pid=1818 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:24.014000 audit: BPF prog-id=77 op=LOAD Jul 10 00:37:24.014000 audit[1818]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00019fc30 a2=78 a3=c0001ff528 items=0 ppid=1510 pid=1818 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:37:24.014000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3731336162666635333535346535343834323535366230643736306561 Jul 10 00:37:24.037916 env[1200]: time="2025-07-10T00:37:24.037855845Z" level=info msg="StartContainer for \"713abff53554e54842556b0d760ea65f5fee2ffd1dc7b0528d624def42ef381b\" returns successfully" Jul 10 00:37:24.154000 audit[1847]: NETFILTER_CFG table=filter:69 family=2 entries=15 op=nft_register_rule pid=1847 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 10 00:37:24.154000 audit[1847]: SYSCALL arch=c000003e syscall=46 success=yes exit=4504 a0=3 a1=7ffc0d4526e0 a2=0 a3=7ffc0d4526cc items=0 ppid=1656 pid=1847 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:37:24.154000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 10 00:37:24.162000 audit[1847]: NETFILTER_CFG table=nat:70 family=2 entries=37 op=nft_register_chain pid=1847 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 10 00:37:24.162000 audit[1847]: SYSCALL arch=c000003e syscall=46 success=yes exit=14964 a0=3 a1=7ffc0d4526e0 a2=0 a3=7ffc0d4526cc items=0 ppid=1656 pid=1847 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:37:24.162000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 10 00:37:24.240088 kubelet[1438]: E0710 00:37:24.239929 1438 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 00:37:24.641000 audit[1849]: NETFILTER_CFG table=filter:71 family=2 entries=12 op=nft_register_rule pid=1849 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 10 00:37:24.641000 audit[1849]: SYSCALL arch=c000003e syscall=46 success=yes exit=4504 a0=3 a1=7ffde9bdc410 a2=0 a3=7ffde9bdc3fc items=0 ppid=1656 pid=1849 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:37:24.641000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 10 00:37:24.646000 audit[1849]: NETFILTER_CFG table=nat:72 family=2 entries=46 op=nft_register_rule pid=1849 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 10 00:37:24.646000 audit[1849]: SYSCALL arch=c000003e syscall=46 success=yes exit=14964 a0=3 a1=7ffde9bdc410 a2=0 a3=7ffde9bdc3fc items=0 ppid=1656 pid=1849 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:37:24.646000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 10 00:37:24.663796 kubelet[1438]: E0710 00:37:24.663736 1438 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-76p48" podUID="f42a92fd-7908-4d38-9f25-e2008b563302" Jul 10 00:37:25.240536 kubelet[1438]: E0710 00:37:25.240474 1438 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 00:37:25.260000 audit[1852]: NETFILTER_CFG table=filter:73 family=2 entries=12 op=nft_register_rule pid=1852 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 10 00:37:25.260000 audit[1852]: SYSCALL arch=c000003e syscall=46 success=yes exit=4504 a0=3 a1=7ffea09c37e0 a2=0 a3=7ffea09c37cc items=0 ppid=1656 pid=1852 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:37:25.260000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 10 00:37:25.273000 audit[1852]: NETFILTER_CFG table=nat:74 family=2 entries=58 op=nft_register_chain pid=1852 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 10 00:37:25.273000 audit[1852]: SYSCALL arch=c000003e syscall=46 success=yes exit=20628 a0=3 a1=7ffea09c37e0 a2=0 a3=7ffea09c37cc items=0 ppid=1656 pid=1852 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:37:25.273000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 10 00:37:25.363454 systemd[1]: cri-containerd-713abff53554e54842556b0d760ea65f5fee2ffd1dc7b0528d624def42ef381b.scope: Deactivated successfully. Jul 10 00:37:25.367000 audit: BPF prog-id=77 op=UNLOAD Jul 10 00:37:25.380018 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-713abff53554e54842556b0d760ea65f5fee2ffd1dc7b0528d624def42ef381b-rootfs.mount: Deactivated successfully. Jul 10 00:37:25.432247 kubelet[1438]: I0710 00:37:25.432206 1438 kubelet_node_status.go:501] "Fast updating node status as it just became ready" Jul 10 00:37:26.004894 env[1200]: time="2025-07-10T00:37:26.004825084Z" level=info msg="shim disconnected" id=713abff53554e54842556b0d760ea65f5fee2ffd1dc7b0528d624def42ef381b Jul 10 00:37:26.004894 env[1200]: time="2025-07-10T00:37:26.004874767Z" level=warning msg="cleaning up after shim disconnected" id=713abff53554e54842556b0d760ea65f5fee2ffd1dc7b0528d624def42ef381b namespace=k8s.io Jul 10 00:37:26.004894 env[1200]: time="2025-07-10T00:37:26.004885247Z" level=info msg="cleaning up dead shim" Jul 10 00:37:26.011049 env[1200]: time="2025-07-10T00:37:26.011020723Z" level=warning msg="cleanup warnings time=\"2025-07-10T00:37:26Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=1866 runtime=io.containerd.runc.v2\n" Jul 10 00:37:26.241428 kubelet[1438]: E0710 00:37:26.241341 1438 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 00:37:26.667313 systemd[1]: Created slice kubepods-besteffort-podf42a92fd_7908_4d38_9f25_e2008b563302.slice. Jul 10 00:37:26.669379 env[1200]: time="2025-07-10T00:37:26.669341179Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-76p48,Uid:f42a92fd-7908-4d38-9f25-e2008b563302,Namespace:calico-system,Attempt:0,}" Jul 10 00:37:26.689221 env[1200]: time="2025-07-10T00:37:26.689178170Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.30.2\"" Jul 10 00:37:26.773436 env[1200]: time="2025-07-10T00:37:26.773321950Z" level=error msg="Failed to destroy network for sandbox \"36380709dfe2d8e250ffd502ca39a5316c83dda329c5a12e4d2d7efae44883db\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 10 00:37:26.773777 env[1200]: time="2025-07-10T00:37:26.773739773Z" level=error msg="encountered an error cleaning up failed sandbox \"36380709dfe2d8e250ffd502ca39a5316c83dda329c5a12e4d2d7efae44883db\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 10 00:37:26.773816 env[1200]: time="2025-07-10T00:37:26.773792062Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-76p48,Uid:f42a92fd-7908-4d38-9f25-e2008b563302,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"36380709dfe2d8e250ffd502ca39a5316c83dda329c5a12e4d2d7efae44883db\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 10 00:37:26.774158 kubelet[1438]: E0710 00:37:26.774093 1438 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"36380709dfe2d8e250ffd502ca39a5316c83dda329c5a12e4d2d7efae44883db\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 10 00:37:26.774229 kubelet[1438]: E0710 00:37:26.774193 1438 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"36380709dfe2d8e250ffd502ca39a5316c83dda329c5a12e4d2d7efae44883db\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-76p48" Jul 10 00:37:26.774229 kubelet[1438]: E0710 00:37:26.774216 1438 kuberuntime_manager.go:1237] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"36380709dfe2d8e250ffd502ca39a5316c83dda329c5a12e4d2d7efae44883db\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-76p48" Jul 10 00:37:26.774287 kubelet[1438]: E0710 00:37:26.774267 1438 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-76p48_calico-system(f42a92fd-7908-4d38-9f25-e2008b563302)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-76p48_calico-system(f42a92fd-7908-4d38-9f25-e2008b563302)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"36380709dfe2d8e250ffd502ca39a5316c83dda329c5a12e4d2d7efae44883db\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-76p48" podUID="f42a92fd-7908-4d38-9f25-e2008b563302" Jul 10 00:37:26.774940 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-36380709dfe2d8e250ffd502ca39a5316c83dda329c5a12e4d2d7efae44883db-shm.mount: Deactivated successfully. Jul 10 00:37:27.242560 kubelet[1438]: E0710 00:37:27.242509 1438 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 00:37:27.690394 kubelet[1438]: I0710 00:37:27.690286 1438 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="36380709dfe2d8e250ffd502ca39a5316c83dda329c5a12e4d2d7efae44883db" Jul 10 00:37:27.690928 env[1200]: time="2025-07-10T00:37:27.690894456Z" level=info msg="StopPodSandbox for \"36380709dfe2d8e250ffd502ca39a5316c83dda329c5a12e4d2d7efae44883db\"" Jul 10 00:37:27.712144 env[1200]: time="2025-07-10T00:37:27.712078804Z" level=error msg="StopPodSandbox for \"36380709dfe2d8e250ffd502ca39a5316c83dda329c5a12e4d2d7efae44883db\" failed" error="failed to destroy network for sandbox \"36380709dfe2d8e250ffd502ca39a5316c83dda329c5a12e4d2d7efae44883db\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 10 00:37:27.712396 kubelet[1438]: E0710 00:37:27.712345 1438 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"36380709dfe2d8e250ffd502ca39a5316c83dda329c5a12e4d2d7efae44883db\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="36380709dfe2d8e250ffd502ca39a5316c83dda329c5a12e4d2d7efae44883db" Jul 10 00:37:27.712490 kubelet[1438]: E0710 00:37:27.712440 1438 kuberuntime_manager.go:1546] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"36380709dfe2d8e250ffd502ca39a5316c83dda329c5a12e4d2d7efae44883db"} Jul 10 00:37:27.712609 kubelet[1438]: E0710 00:37:27.712506 1438 kuberuntime_manager.go:1146] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"f42a92fd-7908-4d38-9f25-e2008b563302\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"36380709dfe2d8e250ffd502ca39a5316c83dda329c5a12e4d2d7efae44883db\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Jul 10 00:37:27.712609 kubelet[1438]: E0710 00:37:27.712533 1438 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"f42a92fd-7908-4d38-9f25-e2008b563302\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"36380709dfe2d8e250ffd502ca39a5316c83dda329c5a12e4d2d7efae44883db\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-76p48" podUID="f42a92fd-7908-4d38-9f25-e2008b563302" Jul 10 00:37:28.242976 kubelet[1438]: E0710 00:37:28.242897 1438 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 00:37:29.243120 kubelet[1438]: E0710 00:37:29.243050 1438 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 00:37:30.243944 kubelet[1438]: E0710 00:37:30.243864 1438 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 00:37:30.392679 systemd[1]: Created slice kubepods-besteffort-podadb6abc2_1bb5_4ddf_8323_5dacb38a0c9b.slice. Jul 10 00:37:30.459637 kubelet[1438]: I0710 00:37:30.459571 1438 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-l8rfz\" (UniqueName: \"kubernetes.io/projected/adb6abc2-1bb5-4ddf-8323-5dacb38a0c9b-kube-api-access-l8rfz\") pod \"nginx-deployment-7fcdb87857-sr5g8\" (UID: \"adb6abc2-1bb5-4ddf-8323-5dacb38a0c9b\") " pod="default/nginx-deployment-7fcdb87857-sr5g8" Jul 10 00:37:30.695390 env[1200]: time="2025-07-10T00:37:30.695272046Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-7fcdb87857-sr5g8,Uid:adb6abc2-1bb5-4ddf-8323-5dacb38a0c9b,Namespace:default,Attempt:0,}" Jul 10 00:37:30.756383 env[1200]: time="2025-07-10T00:37:30.756271512Z" level=error msg="Failed to destroy network for sandbox \"1fcb6fe1dbf10c3282c690abef16ec7281c5aea339fe6378e3f92bac9e19b611\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 10 00:37:30.758294 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-1fcb6fe1dbf10c3282c690abef16ec7281c5aea339fe6378e3f92bac9e19b611-shm.mount: Deactivated successfully. Jul 10 00:37:30.801436 env[1200]: time="2025-07-10T00:37:30.801326466Z" level=error msg="encountered an error cleaning up failed sandbox \"1fcb6fe1dbf10c3282c690abef16ec7281c5aea339fe6378e3f92bac9e19b611\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 10 00:37:30.801657 env[1200]: time="2025-07-10T00:37:30.801479153Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-7fcdb87857-sr5g8,Uid:adb6abc2-1bb5-4ddf-8323-5dacb38a0c9b,Namespace:default,Attempt:0,} failed, error" error="failed to setup network for sandbox \"1fcb6fe1dbf10c3282c690abef16ec7281c5aea339fe6378e3f92bac9e19b611\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 10 00:37:30.801820 kubelet[1438]: E0710 00:37:30.801763 1438 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"1fcb6fe1dbf10c3282c690abef16ec7281c5aea339fe6378e3f92bac9e19b611\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 10 00:37:30.801872 kubelet[1438]: E0710 00:37:30.801839 1438 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"1fcb6fe1dbf10c3282c690abef16ec7281c5aea339fe6378e3f92bac9e19b611\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-7fcdb87857-sr5g8" Jul 10 00:37:30.801872 kubelet[1438]: E0710 00:37:30.801863 1438 kuberuntime_manager.go:1237] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"1fcb6fe1dbf10c3282c690abef16ec7281c5aea339fe6378e3f92bac9e19b611\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-7fcdb87857-sr5g8" Jul 10 00:37:30.801949 kubelet[1438]: E0710 00:37:30.801911 1438 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"nginx-deployment-7fcdb87857-sr5g8_default(adb6abc2-1bb5-4ddf-8323-5dacb38a0c9b)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"nginx-deployment-7fcdb87857-sr5g8_default(adb6abc2-1bb5-4ddf-8323-5dacb38a0c9b)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"1fcb6fe1dbf10c3282c690abef16ec7281c5aea339fe6378e3f92bac9e19b611\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-7fcdb87857-sr5g8" podUID="adb6abc2-1bb5-4ddf-8323-5dacb38a0c9b" Jul 10 00:37:31.244518 kubelet[1438]: E0710 00:37:31.244458 1438 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 00:37:31.697885 kubelet[1438]: I0710 00:37:31.697762 1438 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="1fcb6fe1dbf10c3282c690abef16ec7281c5aea339fe6378e3f92bac9e19b611" Jul 10 00:37:31.698301 env[1200]: time="2025-07-10T00:37:31.698261099Z" level=info msg="StopPodSandbox for \"1fcb6fe1dbf10c3282c690abef16ec7281c5aea339fe6378e3f92bac9e19b611\"" Jul 10 00:37:31.723631 env[1200]: time="2025-07-10T00:37:31.723552018Z" level=error msg="StopPodSandbox for \"1fcb6fe1dbf10c3282c690abef16ec7281c5aea339fe6378e3f92bac9e19b611\" failed" error="failed to destroy network for sandbox \"1fcb6fe1dbf10c3282c690abef16ec7281c5aea339fe6378e3f92bac9e19b611\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 10 00:37:31.724131 kubelet[1438]: E0710 00:37:31.724081 1438 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"1fcb6fe1dbf10c3282c690abef16ec7281c5aea339fe6378e3f92bac9e19b611\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="1fcb6fe1dbf10c3282c690abef16ec7281c5aea339fe6378e3f92bac9e19b611" Jul 10 00:37:31.724227 kubelet[1438]: E0710 00:37:31.724149 1438 kuberuntime_manager.go:1546] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"1fcb6fe1dbf10c3282c690abef16ec7281c5aea339fe6378e3f92bac9e19b611"} Jul 10 00:37:31.724227 kubelet[1438]: E0710 00:37:31.724190 1438 kuberuntime_manager.go:1146] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"adb6abc2-1bb5-4ddf-8323-5dacb38a0c9b\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"1fcb6fe1dbf10c3282c690abef16ec7281c5aea339fe6378e3f92bac9e19b611\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Jul 10 00:37:31.724227 kubelet[1438]: E0710 00:37:31.724215 1438 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"adb6abc2-1bb5-4ddf-8323-5dacb38a0c9b\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"1fcb6fe1dbf10c3282c690abef16ec7281c5aea339fe6378e3f92bac9e19b611\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-7fcdb87857-sr5g8" podUID="adb6abc2-1bb5-4ddf-8323-5dacb38a0c9b" Jul 10 00:37:32.245003 kubelet[1438]: E0710 00:37:32.244937 1438 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 00:37:32.970139 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2451631022.mount: Deactivated successfully. Jul 10 00:37:33.232969 kubelet[1438]: E0710 00:37:33.232823 1438 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 00:37:33.245572 kubelet[1438]: E0710 00:37:33.245525 1438 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 00:37:33.322545 env[1200]: time="2025-07-10T00:37:33.322480259Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.30.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 10 00:37:33.324745 env[1200]: time="2025-07-10T00:37:33.324709510Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:cc52550d767f73458fee2ee68db9db5de30d175e8fa4569ebdb43610127b6d20,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 10 00:37:33.324000 audit[1980]: NETFILTER_CFG table=filter:75 family=2 entries=12 op=nft_register_rule pid=1980 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 10 00:37:33.326647 env[1200]: time="2025-07-10T00:37:33.326612589Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.30.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 10 00:37:33.326945 kernel: kauditd_printk_skb: 58 callbacks suppressed Jul 10 00:37:33.327013 kernel: audit: type=1325 audit(1752107853.324:536): table=filter:75 family=2 entries=12 op=nft_register_rule pid=1980 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 10 00:37:33.327992 env[1200]: time="2025-07-10T00:37:33.327967570Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:e94d49349cc361ef2216d27dda4a097278984d778279f66e79b0616c827c6760,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 10 00:37:33.328501 env[1200]: time="2025-07-10T00:37:33.328474491Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.30.2\" returns image reference \"sha256:cc52550d767f73458fee2ee68db9db5de30d175e8fa4569ebdb43610127b6d20\"" Jul 10 00:37:33.324000 audit[1980]: SYSCALL arch=c000003e syscall=46 success=yes exit=4504 a0=3 a1=7ffd9521ac50 a2=0 a3=7ffd9521ac3c items=0 ppid=1656 pid=1980 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:37:33.335262 env[1200]: time="2025-07-10T00:37:33.335223868Z" level=info msg="CreateContainer within sandbox \"3b6bcad8a6d30879e2d51022fe227ff1caaa936d43921f9a3bc64ba68a6b73c7\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Jul 10 00:37:33.335877 kernel: audit: type=1300 audit(1752107853.324:536): arch=c000003e syscall=46 success=yes exit=4504 a0=3 a1=7ffd9521ac50 a2=0 a3=7ffd9521ac3c items=0 ppid=1656 pid=1980 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:37:33.335978 kernel: audit: type=1327 audit(1752107853.324:536): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 10 00:37:33.324000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 10 00:37:33.338000 audit[1980]: NETFILTER_CFG table=nat:76 family=2 entries=22 op=nft_register_rule pid=1980 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 10 00:37:33.338000 audit[1980]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffd9521ac50 a2=0 a3=7ffd9521ac3c items=0 ppid=1656 pid=1980 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:37:33.349310 kernel: audit: type=1325 audit(1752107853.338:537): table=nat:76 family=2 entries=22 op=nft_register_rule pid=1980 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 10 00:37:33.349366 kernel: audit: type=1300 audit(1752107853.338:537): arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffd9521ac50 a2=0 a3=7ffd9521ac3c items=0 ppid=1656 pid=1980 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:37:33.349483 kernel: audit: type=1327 audit(1752107853.338:537): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 10 00:37:33.338000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 10 00:37:33.358000 env[1200]: time="2025-07-10T00:37:33.357933337Z" level=info msg="CreateContainer within sandbox \"3b6bcad8a6d30879e2d51022fe227ff1caaa936d43921f9a3bc64ba68a6b73c7\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"5e11e2e4c2bc5029c66f24ba0b238d1cd79e13b39b59e573f464f4221e3c2c6a\"" Jul 10 00:37:33.358437 env[1200]: time="2025-07-10T00:37:33.358389212Z" level=info msg="StartContainer for \"5e11e2e4c2bc5029c66f24ba0b238d1cd79e13b39b59e573f464f4221e3c2c6a\"" Jul 10 00:37:33.373336 systemd[1]: Started cri-containerd-5e11e2e4c2bc5029c66f24ba0b238d1cd79e13b39b59e573f464f4221e3c2c6a.scope. Jul 10 00:37:33.386000 audit[1993]: AVC avc: denied { perfmon } for pid=1993 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:33.386000 audit[1993]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7f5ed666a2f8 items=0 ppid=1510 pid=1993 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:37:33.395211 kernel: audit: type=1400 audit(1752107853.386:538): avc: denied { perfmon } for pid=1993 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:33.395258 kernel: audit: type=1300 audit(1752107853.386:538): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7f5ed666a2f8 items=0 ppid=1510 pid=1993 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:37:33.395283 kernel: audit: type=1327 audit(1752107853.386:538): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3565313165326534633262633530323963363666323462613062323338 Jul 10 00:37:33.386000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3565313165326534633262633530323963363666323462613062323338 Jul 10 00:37:33.386000 audit[1993]: AVC avc: denied { bpf } for pid=1993 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:33.401807 kernel: audit: type=1400 audit(1752107853.386:539): avc: denied { bpf } for pid=1993 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:33.386000 audit[1993]: AVC avc: denied { bpf } for pid=1993 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:33.386000 audit[1993]: AVC avc: denied { bpf } for pid=1993 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:33.386000 audit[1993]: AVC avc: denied { perfmon } for pid=1993 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:33.386000 audit[1993]: AVC avc: denied { perfmon } for pid=1993 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:33.386000 audit[1993]: AVC avc: denied { perfmon } for pid=1993 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:33.386000 audit[1993]: AVC avc: denied { perfmon } for pid=1993 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:33.386000 audit[1993]: AVC avc: denied { perfmon } for pid=1993 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:33.386000 audit[1993]: AVC avc: denied { bpf } for pid=1993 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:33.386000 audit[1993]: AVC avc: denied { bpf } for pid=1993 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:33.386000 audit: BPF prog-id=78 op=LOAD Jul 10 00:37:33.386000 audit[1993]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c0000244e8 items=0 ppid=1510 pid=1993 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:37:33.386000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3565313165326534633262633530323963363666323462613062323338 Jul 10 00:37:33.389000 audit[1993]: AVC avc: denied { bpf } for pid=1993 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:33.389000 audit[1993]: AVC avc: denied { bpf } for pid=1993 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:33.389000 audit[1993]: AVC avc: denied { perfmon } for pid=1993 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:33.389000 audit[1993]: AVC avc: denied { perfmon } for pid=1993 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:33.389000 audit[1993]: AVC avc: denied { perfmon } for pid=1993 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:33.389000 audit[1993]: AVC avc: denied { perfmon } for pid=1993 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:33.389000 audit[1993]: AVC avc: denied { perfmon } for pid=1993 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:33.389000 audit[1993]: AVC avc: denied { bpf } for pid=1993 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:33.389000 audit[1993]: AVC avc: denied { bpf } for pid=1993 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:33.389000 audit: BPF prog-id=79 op=LOAD Jul 10 00:37:33.389000 audit[1993]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c000024538 items=0 ppid=1510 pid=1993 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:37:33.389000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3565313165326534633262633530323963363666323462613062323338 Jul 10 00:37:33.394000 audit: BPF prog-id=79 op=UNLOAD Jul 10 00:37:33.394000 audit: BPF prog-id=78 op=UNLOAD Jul 10 00:37:33.394000 audit[1993]: AVC avc: denied { bpf } for pid=1993 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:33.394000 audit[1993]: AVC avc: denied { bpf } for pid=1993 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:33.394000 audit[1993]: AVC avc: denied { bpf } for pid=1993 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:33.394000 audit[1993]: AVC avc: denied { perfmon } for pid=1993 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:33.394000 audit[1993]: AVC avc: denied { perfmon } for pid=1993 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:33.394000 audit[1993]: AVC avc: denied { perfmon } for pid=1993 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:33.394000 audit[1993]: AVC avc: denied { perfmon } for pid=1993 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:33.394000 audit[1993]: AVC avc: denied { perfmon } for pid=1993 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:33.394000 audit[1993]: AVC avc: denied { bpf } for pid=1993 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:33.394000 audit[1993]: AVC avc: denied { bpf } for pid=1993 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:33.394000 audit: BPF prog-id=80 op=LOAD Jul 10 00:37:33.394000 audit[1993]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c0000245c8 items=0 ppid=1510 pid=1993 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:37:33.394000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3565313165326534633262633530323963363666323462613062323338 Jul 10 00:37:33.413572 env[1200]: time="2025-07-10T00:37:33.413519130Z" level=info msg="StartContainer for \"5e11e2e4c2bc5029c66f24ba0b238d1cd79e13b39b59e573f464f4221e3c2c6a\" returns successfully" Jul 10 00:37:33.492839 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Jul 10 00:37:33.492967 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. Jul 10 00:37:33.716839 kubelet[1438]: I0710 00:37:33.716749 1438 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-node-wrm44" podStartSLOduration=3.118837786 podStartE2EDuration="19.716726041s" podCreationTimestamp="2025-07-10 00:37:14 +0000 UTC" firstStartedPulling="2025-07-10 00:37:16.731458832 +0000 UTC m=+4.159663044" lastFinishedPulling="2025-07-10 00:37:33.329347087 +0000 UTC m=+20.757551299" observedRunningTime="2025-07-10 00:37:33.716491311 +0000 UTC m=+21.144695523" watchObservedRunningTime="2025-07-10 00:37:33.716726041 +0000 UTC m=+21.144930253" Jul 10 00:37:33.792000 audit[2076]: NETFILTER_CFG table=filter:77 family=2 entries=11 op=nft_register_rule pid=2076 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 10 00:37:33.792000 audit[2076]: SYSCALL arch=c000003e syscall=46 success=yes exit=3760 a0=3 a1=7ffd5aac05e0 a2=0 a3=7ffd5aac05cc items=0 ppid=1656 pid=2076 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:37:33.792000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 10 00:37:33.798000 audit[2076]: NETFILTER_CFG table=nat:78 family=2 entries=29 op=nft_register_chain pid=2076 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 10 00:37:33.798000 audit[2076]: SYSCALL arch=c000003e syscall=46 success=yes exit=10116 a0=3 a1=7ffd5aac05e0 a2=0 a3=7ffd5aac05cc items=0 ppid=1656 pid=2076 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:37:33.798000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 10 00:37:34.245827 kubelet[1438]: E0710 00:37:34.245763 1438 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 00:37:34.675000 audit[2110]: AVC avc: denied { write } for pid=2110 comm="tee" name="fd" dev="proc" ino=19230 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Jul 10 00:37:34.675000 audit[2110]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd0f36a7f5 a2=241 a3=1b6 items=1 ppid=2085 pid=2110 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:37:34.675000 audit: CWD cwd="/etc/service/enabled/confd/log" Jul 10 00:37:34.675000 audit: PATH item=0 name="/dev/fd/63" inode=19224 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:37:34.675000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Jul 10 00:37:34.677000 audit[2113]: AVC avc: denied { write } for pid=2113 comm="tee" name="fd" dev="proc" ino=19234 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Jul 10 00:37:34.677000 audit[2113]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd7c0bc7f7 a2=241 a3=1b6 items=1 ppid=2093 pid=2113 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:37:34.677000 audit: CWD cwd="/etc/service/enabled/cni/log" Jul 10 00:37:34.677000 audit: PATH item=0 name="/dev/fd/63" inode=19227 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:37:34.677000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Jul 10 00:37:34.678000 audit[2116]: AVC avc: denied { write } for pid=2116 comm="tee" name="fd" dev="proc" ino=18154 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Jul 10 00:37:34.678000 audit[2116]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff125307f6 a2=241 a3=1b6 items=1 ppid=2087 pid=2116 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:37:34.678000 audit: CWD cwd="/etc/service/enabled/bird/log" Jul 10 00:37:34.678000 audit: PATH item=0 name="/dev/fd/63" inode=18149 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:37:34.678000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Jul 10 00:37:34.682000 audit[2124]: AVC avc: denied { write } for pid=2124 comm="tee" name="fd" dev="proc" ino=18162 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Jul 10 00:37:34.682000 audit[2124]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffeb07a97f5 a2=241 a3=1b6 items=1 ppid=2100 pid=2124 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:37:34.682000 audit: CWD cwd="/etc/service/enabled/felix/log" Jul 10 00:37:34.683000 audit[2122]: AVC avc: denied { write } for pid=2122 comm="tee" name="fd" dev="proc" ino=19244 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Jul 10 00:37:34.682000 audit: PATH item=0 name="/dev/fd/63" inode=18159 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:37:34.682000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Jul 10 00:37:34.683000 audit[2122]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc07e987e5 a2=241 a3=1b6 items=1 ppid=2086 pid=2122 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:37:34.683000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Jul 10 00:37:34.683000 audit: PATH item=0 name="/dev/fd/63" inode=18158 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:37:34.683000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Jul 10 00:37:34.694000 audit[2154]: AVC avc: denied { write } for pid=2154 comm="tee" name="fd" dev="proc" ino=20619 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Jul 10 00:37:34.694000 audit[2154]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe4285e7f5 a2=241 a3=1b6 items=1 ppid=2091 pid=2154 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:37:34.694000 audit: CWD cwd="/etc/service/enabled/bird6/log" Jul 10 00:37:34.694000 audit: PATH item=0 name="/dev/fd/63" inode=20616 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:37:34.694000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Jul 10 00:37:34.707000 audit[2160]: AVC avc: denied { write } for pid=2160 comm="tee" name="fd" dev="proc" ino=19253 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Jul 10 00:37:34.707000 audit[2160]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd658277e6 a2=241 a3=1b6 items=1 ppid=2096 pid=2160 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:37:34.707000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Jul 10 00:37:34.707000 audit: PATH item=0 name="/dev/fd/63" inode=20280 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:37:34.707000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Jul 10 00:37:34.907000 audit[2227]: AVC avc: denied { bpf } for pid=2227 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:34.907000 audit[2227]: AVC avc: denied { bpf } for pid=2227 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:34.907000 audit[2227]: AVC avc: denied { perfmon } for pid=2227 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:34.907000 audit[2227]: AVC avc: denied { perfmon } for pid=2227 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:34.907000 audit[2227]: AVC avc: denied { perfmon } for pid=2227 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:34.907000 audit[2227]: AVC avc: denied { perfmon } for pid=2227 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:34.907000 audit[2227]: AVC avc: denied { perfmon } for pid=2227 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:34.907000 audit[2227]: AVC avc: denied { bpf } for pid=2227 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:34.907000 audit[2227]: AVC avc: denied { bpf } for pid=2227 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:34.907000 audit: BPF prog-id=81 op=LOAD Jul 10 00:37:34.907000 audit[2227]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffc834e11c0 a2=98 a3=1fffffffffffffff items=0 ppid=2102 pid=2227 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:37:34.907000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F74632F676C6F62616C732F63616C695F63746C625F70726F677300747970650070726F675F6172726179006B657900340076616C7565003400656E74726965730033006E616D650063616C695F63746C625F70726F677300666C6167730030 Jul 10 00:37:34.907000 audit: BPF prog-id=81 op=UNLOAD Jul 10 00:37:34.907000 audit[2227]: AVC avc: denied { bpf } for pid=2227 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:34.907000 audit[2227]: AVC avc: denied { bpf } for pid=2227 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:34.907000 audit[2227]: AVC avc: denied { perfmon } for pid=2227 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:34.907000 audit[2227]: AVC avc: denied { perfmon } for pid=2227 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:34.907000 audit[2227]: AVC avc: denied { perfmon } for pid=2227 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:34.907000 audit[2227]: AVC avc: denied { perfmon } for pid=2227 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:34.907000 audit[2227]: AVC avc: denied { perfmon } for pid=2227 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:34.907000 audit[2227]: AVC avc: denied { bpf } for pid=2227 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:34.907000 audit[2227]: AVC avc: denied { bpf } for pid=2227 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:34.907000 audit: BPF prog-id=82 op=LOAD Jul 10 00:37:34.907000 audit[2227]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffc834e10a0 a2=94 a3=3 items=0 ppid=2102 pid=2227 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:37:34.907000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F74632F676C6F62616C732F63616C695F63746C625F70726F677300747970650070726F675F6172726179006B657900340076616C7565003400656E74726965730033006E616D650063616C695F63746C625F70726F677300666C6167730030 Jul 10 00:37:34.908000 audit: BPF prog-id=82 op=UNLOAD Jul 10 00:37:34.908000 audit[2227]: AVC avc: denied { bpf } for pid=2227 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:34.908000 audit[2227]: AVC avc: denied { bpf } for pid=2227 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:34.908000 audit[2227]: AVC avc: denied { perfmon } for pid=2227 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:34.908000 audit[2227]: AVC avc: denied { perfmon } for pid=2227 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:34.908000 audit[2227]: AVC avc: denied { perfmon } for pid=2227 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:34.908000 audit[2227]: AVC avc: denied { perfmon } for pid=2227 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:34.908000 audit[2227]: AVC avc: denied { perfmon } for pid=2227 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:34.908000 audit[2227]: AVC avc: denied { bpf } for pid=2227 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:34.908000 audit[2227]: AVC avc: denied { bpf } for pid=2227 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:34.908000 audit: BPF prog-id=83 op=LOAD Jul 10 00:37:34.908000 audit[2227]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffc834e10e0 a2=94 a3=7ffc834e12c0 items=0 ppid=2102 pid=2227 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:37:34.908000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F74632F676C6F62616C732F63616C695F63746C625F70726F677300747970650070726F675F6172726179006B657900340076616C7565003400656E74726965730033006E616D650063616C695F63746C625F70726F677300666C6167730030 Jul 10 00:37:34.908000 audit: BPF prog-id=83 op=UNLOAD Jul 10 00:37:34.908000 audit[2227]: AVC avc: denied { perfmon } for pid=2227 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:34.908000 audit[2227]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=0 a1=7ffc834e11b0 a2=50 a3=a000000085 items=0 ppid=2102 pid=2227 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:37:34.908000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F74632F676C6F62616C732F63616C695F63746C625F70726F677300747970650070726F675F6172726179006B657900340076616C7565003400656E74726965730033006E616D650063616C695F63746C625F70726F677300666C6167730030 Jul 10 00:37:34.908000 audit[2228]: AVC avc: denied { bpf } for pid=2228 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:34.908000 audit[2228]: AVC avc: denied { bpf } for pid=2228 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:34.908000 audit[2228]: AVC avc: denied { perfmon } for pid=2228 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:34.908000 audit[2228]: AVC avc: denied { perfmon } for pid=2228 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:34.908000 audit[2228]: AVC avc: denied { perfmon } for pid=2228 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:34.908000 audit[2228]: AVC avc: denied { perfmon } for pid=2228 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:34.908000 audit[2228]: AVC avc: denied { perfmon } for pid=2228 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:34.908000 audit[2228]: AVC avc: denied { bpf } for pid=2228 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:34.908000 audit[2228]: AVC avc: denied { bpf } for pid=2228 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:34.908000 audit: BPF prog-id=84 op=LOAD Jul 10 00:37:34.908000 audit[2228]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffef1cc6640 a2=98 a3=3 items=0 ppid=2102 pid=2228 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:37:34.908000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Jul 10 00:37:34.909000 audit: BPF prog-id=84 op=UNLOAD Jul 10 00:37:34.909000 audit[2228]: AVC avc: denied { bpf } for pid=2228 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:34.909000 audit[2228]: AVC avc: denied { bpf } for pid=2228 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:34.909000 audit[2228]: AVC avc: denied { perfmon } for pid=2228 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:34.909000 audit[2228]: AVC avc: denied { perfmon } for pid=2228 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:34.909000 audit[2228]: AVC avc: denied { perfmon } for pid=2228 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:34.909000 audit[2228]: AVC avc: denied { perfmon } for pid=2228 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:34.909000 audit[2228]: AVC avc: denied { perfmon } for pid=2228 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:34.909000 audit[2228]: AVC avc: denied { bpf } for pid=2228 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:34.909000 audit[2228]: AVC avc: denied { bpf } for pid=2228 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:34.909000 audit: BPF prog-id=85 op=LOAD Jul 10 00:37:34.909000 audit[2228]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffef1cc6430 a2=94 a3=54428f items=0 ppid=2102 pid=2228 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:37:34.909000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Jul 10 00:37:34.909000 audit: BPF prog-id=85 op=UNLOAD Jul 10 00:37:34.909000 audit[2228]: AVC avc: denied { bpf } for pid=2228 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:34.909000 audit[2228]: AVC avc: denied { bpf } for pid=2228 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:34.909000 audit[2228]: AVC avc: denied { perfmon } for pid=2228 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:34.909000 audit[2228]: AVC avc: denied { perfmon } for pid=2228 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:34.909000 audit[2228]: AVC avc: denied { perfmon } for pid=2228 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:34.909000 audit[2228]: AVC avc: denied { perfmon } for pid=2228 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:34.909000 audit[2228]: AVC avc: denied { perfmon } for pid=2228 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:34.909000 audit[2228]: AVC avc: denied { bpf } for pid=2228 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:34.909000 audit[2228]: AVC avc: denied { bpf } for pid=2228 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:34.909000 audit: BPF prog-id=86 op=LOAD Jul 10 00:37:34.909000 audit[2228]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffef1cc6460 a2=94 a3=2 items=0 ppid=2102 pid=2228 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:37:34.909000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Jul 10 00:37:34.909000 audit: BPF prog-id=86 op=UNLOAD Jul 10 00:37:35.025000 audit[2228]: AVC avc: denied { bpf } for pid=2228 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:35.025000 audit[2228]: AVC avc: denied { bpf } for pid=2228 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:35.025000 audit[2228]: AVC avc: denied { perfmon } for pid=2228 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:35.025000 audit[2228]: AVC avc: denied { perfmon } for pid=2228 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:35.025000 audit[2228]: AVC avc: denied { perfmon } for pid=2228 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:35.025000 audit[2228]: AVC avc: denied { perfmon } for pid=2228 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:35.025000 audit[2228]: AVC avc: denied { perfmon } for pid=2228 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:35.025000 audit[2228]: AVC avc: denied { bpf } for pid=2228 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:35.025000 audit[2228]: AVC avc: denied { bpf } for pid=2228 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:35.025000 audit: BPF prog-id=87 op=LOAD Jul 10 00:37:35.025000 audit[2228]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffef1cc6320 a2=94 a3=1 items=0 ppid=2102 pid=2228 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:37:35.025000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Jul 10 00:37:35.026000 audit: BPF prog-id=87 op=UNLOAD Jul 10 00:37:35.026000 audit[2228]: AVC avc: denied { perfmon } for pid=2228 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:35.026000 audit[2228]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffef1cc63f0 a2=50 a3=7ffef1cc64d0 items=0 ppid=2102 pid=2228 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:37:35.026000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Jul 10 00:37:35.035000 audit[2228]: AVC avc: denied { bpf } for pid=2228 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:35.035000 audit[2228]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffef1cc6330 a2=28 a3=0 items=0 ppid=2102 pid=2228 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:37:35.035000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Jul 10 00:37:35.035000 audit[2228]: AVC avc: denied { bpf } for pid=2228 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:35.035000 audit[2228]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffef1cc6360 a2=28 a3=0 items=0 ppid=2102 pid=2228 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:37:35.035000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Jul 10 00:37:35.035000 audit[2228]: AVC avc: denied { bpf } for pid=2228 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:35.035000 audit[2228]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffef1cc6270 a2=28 a3=0 items=0 ppid=2102 pid=2228 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:37:35.035000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Jul 10 00:37:35.035000 audit[2228]: AVC avc: denied { bpf } for pid=2228 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:35.035000 audit[2228]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffef1cc6380 a2=28 a3=0 items=0 ppid=2102 pid=2228 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:37:35.035000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Jul 10 00:37:35.035000 audit[2228]: AVC avc: denied { bpf } for pid=2228 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:35.035000 audit[2228]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffef1cc6360 a2=28 a3=0 items=0 ppid=2102 pid=2228 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:37:35.035000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Jul 10 00:37:35.035000 audit[2228]: AVC avc: denied { bpf } for pid=2228 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:35.035000 audit[2228]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffef1cc6350 a2=28 a3=0 items=0 ppid=2102 pid=2228 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:37:35.035000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Jul 10 00:37:35.035000 audit[2228]: AVC avc: denied { bpf } for pid=2228 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:35.035000 audit[2228]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffef1cc6380 a2=28 a3=0 items=0 ppid=2102 pid=2228 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:37:35.035000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Jul 10 00:37:35.035000 audit[2228]: AVC avc: denied { bpf } for pid=2228 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:35.035000 audit[2228]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffef1cc6360 a2=28 a3=0 items=0 ppid=2102 pid=2228 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:37:35.035000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Jul 10 00:37:35.035000 audit[2228]: AVC avc: denied { bpf } for pid=2228 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:35.035000 audit[2228]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffef1cc6380 a2=28 a3=0 items=0 ppid=2102 pid=2228 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:37:35.035000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Jul 10 00:37:35.035000 audit[2228]: AVC avc: denied { bpf } for pid=2228 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:35.035000 audit[2228]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffef1cc6350 a2=28 a3=0 items=0 ppid=2102 pid=2228 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:37:35.035000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Jul 10 00:37:35.035000 audit[2228]: AVC avc: denied { bpf } for pid=2228 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:35.035000 audit[2228]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffef1cc63c0 a2=28 a3=0 items=0 ppid=2102 pid=2228 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:37:35.035000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Jul 10 00:37:35.036000 audit[2228]: AVC avc: denied { perfmon } for pid=2228 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:35.036000 audit[2228]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffef1cc6170 a2=50 a3=1 items=0 ppid=2102 pid=2228 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:37:35.036000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Jul 10 00:37:35.036000 audit[2228]: AVC avc: denied { bpf } for pid=2228 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:35.036000 audit[2228]: AVC avc: denied { bpf } for pid=2228 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:35.036000 audit[2228]: AVC avc: denied { perfmon } for pid=2228 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:35.036000 audit[2228]: AVC avc: denied { perfmon } for pid=2228 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:35.036000 audit[2228]: AVC avc: denied { perfmon } for pid=2228 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:35.036000 audit[2228]: AVC avc: denied { perfmon } for pid=2228 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:35.036000 audit[2228]: AVC avc: denied { perfmon } for pid=2228 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:35.036000 audit[2228]: AVC avc: denied { bpf } for pid=2228 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:35.036000 audit[2228]: AVC avc: denied { bpf } for pid=2228 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:35.036000 audit: BPF prog-id=88 op=LOAD Jul 10 00:37:35.036000 audit[2228]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffef1cc6170 a2=94 a3=5 items=0 ppid=2102 pid=2228 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:37:35.036000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Jul 10 00:37:35.036000 audit: BPF prog-id=88 op=UNLOAD Jul 10 00:37:35.036000 audit[2228]: AVC avc: denied { perfmon } for pid=2228 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:35.036000 audit[2228]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffef1cc6220 a2=50 a3=1 items=0 ppid=2102 pid=2228 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:37:35.036000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Jul 10 00:37:35.036000 audit[2228]: AVC avc: denied { bpf } for pid=2228 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:35.036000 audit[2228]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffef1cc6340 a2=4 a3=38 items=0 ppid=2102 pid=2228 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:37:35.036000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Jul 10 00:37:35.036000 audit[2228]: AVC avc: denied { bpf } for pid=2228 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:35.036000 audit[2228]: AVC avc: denied { bpf } for pid=2228 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:35.036000 audit[2228]: AVC avc: denied { perfmon } for pid=2228 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:35.036000 audit[2228]: AVC avc: denied { bpf } for pid=2228 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:35.036000 audit[2228]: AVC avc: denied { perfmon } for pid=2228 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:35.036000 audit[2228]: AVC avc: denied { perfmon } for pid=2228 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:35.036000 audit[2228]: AVC avc: denied { perfmon } for pid=2228 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:35.036000 audit[2228]: AVC avc: denied { perfmon } for pid=2228 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:35.036000 audit[2228]: AVC avc: denied { perfmon } for pid=2228 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:35.036000 audit[2228]: AVC avc: denied { bpf } for pid=2228 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:35.036000 audit[2228]: AVC avc: denied { confidentiality } for pid=2228 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:37:35.036000 audit[2228]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffef1cc6390 a2=94 a3=6 items=0 ppid=2102 pid=2228 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:37:35.036000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Jul 10 00:37:35.036000 audit[2228]: AVC avc: denied { bpf } for pid=2228 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:35.036000 audit[2228]: AVC avc: denied { bpf } for pid=2228 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:35.036000 audit[2228]: AVC avc: denied { perfmon } for pid=2228 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:35.036000 audit[2228]: AVC avc: denied { bpf } for pid=2228 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:35.036000 audit[2228]: AVC avc: denied { perfmon } for pid=2228 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:35.036000 audit[2228]: AVC avc: denied { perfmon } for pid=2228 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:35.036000 audit[2228]: AVC avc: denied { perfmon } for pid=2228 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:35.036000 audit[2228]: AVC avc: denied { perfmon } for pid=2228 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:35.036000 audit[2228]: AVC avc: denied { perfmon } for pid=2228 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:35.036000 audit[2228]: AVC avc: denied { bpf } for pid=2228 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:35.036000 audit[2228]: AVC avc: denied { confidentiality } for pid=2228 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:37:35.036000 audit[2228]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffef1cc5b40 a2=94 a3=88 items=0 ppid=2102 pid=2228 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:37:35.036000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Jul 10 00:37:35.037000 audit[2228]: AVC avc: denied { bpf } for pid=2228 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:35.037000 audit[2228]: AVC avc: denied { bpf } for pid=2228 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:35.037000 audit[2228]: AVC avc: denied { perfmon } for pid=2228 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:35.037000 audit[2228]: AVC avc: denied { bpf } for pid=2228 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:35.037000 audit[2228]: AVC avc: denied { perfmon } for pid=2228 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:35.037000 audit[2228]: AVC avc: denied { perfmon } for pid=2228 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:35.037000 audit[2228]: AVC avc: denied { perfmon } for pid=2228 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:35.037000 audit[2228]: AVC avc: denied { perfmon } for pid=2228 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:35.037000 audit[2228]: AVC avc: denied { perfmon } for pid=2228 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:35.037000 audit[2228]: AVC avc: denied { bpf } for pid=2228 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:35.037000 audit[2228]: AVC avc: denied { confidentiality } for pid=2228 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:37:35.037000 audit[2228]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffef1cc5b40 a2=94 a3=88 items=0 ppid=2102 pid=2228 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:37:35.037000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Jul 10 00:37:35.044000 audit[2231]: AVC avc: denied { bpf } for pid=2231 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:35.044000 audit[2231]: AVC avc: denied { bpf } for pid=2231 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:35.044000 audit[2231]: AVC avc: denied { perfmon } for pid=2231 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:35.044000 audit[2231]: AVC avc: denied { perfmon } for pid=2231 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:35.044000 audit[2231]: AVC avc: denied { perfmon } for pid=2231 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:35.044000 audit[2231]: AVC avc: denied { perfmon } for pid=2231 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:35.044000 audit[2231]: AVC avc: denied { perfmon } for pid=2231 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:35.044000 audit[2231]: AVC avc: denied { bpf } for pid=2231 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:35.044000 audit[2231]: AVC avc: denied { bpf } for pid=2231 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:35.044000 audit: BPF prog-id=89 op=LOAD Jul 10 00:37:35.044000 audit[2231]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffc7c1c9370 a2=98 a3=1999999999999999 items=0 ppid=2102 pid=2231 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:37:35.044000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Jul 10 00:37:35.044000 audit: BPF prog-id=89 op=UNLOAD Jul 10 00:37:35.044000 audit[2231]: AVC avc: denied { bpf } for pid=2231 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:35.044000 audit[2231]: AVC avc: denied { bpf } for pid=2231 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:35.044000 audit[2231]: AVC avc: denied { perfmon } for pid=2231 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:35.044000 audit[2231]: AVC avc: denied { perfmon } for pid=2231 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:35.044000 audit[2231]: AVC avc: denied { perfmon } for pid=2231 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:35.044000 audit[2231]: AVC avc: denied { perfmon } for pid=2231 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:35.044000 audit[2231]: AVC avc: denied { perfmon } for pid=2231 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:35.044000 audit[2231]: AVC avc: denied { bpf } for pid=2231 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:35.044000 audit[2231]: AVC avc: denied { bpf } for pid=2231 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:35.044000 audit: BPF prog-id=90 op=LOAD Jul 10 00:37:35.044000 audit[2231]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffc7c1c9250 a2=94 a3=ffff items=0 ppid=2102 pid=2231 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:37:35.044000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Jul 10 00:37:35.044000 audit: BPF prog-id=90 op=UNLOAD Jul 10 00:37:35.044000 audit[2231]: AVC avc: denied { bpf } for pid=2231 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:35.044000 audit[2231]: AVC avc: denied { bpf } for pid=2231 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:35.044000 audit[2231]: AVC avc: denied { perfmon } for pid=2231 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:35.044000 audit[2231]: AVC avc: denied { perfmon } for pid=2231 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:35.044000 audit[2231]: AVC avc: denied { perfmon } for pid=2231 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:35.044000 audit[2231]: AVC avc: denied { perfmon } for pid=2231 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:35.044000 audit[2231]: AVC avc: denied { perfmon } for pid=2231 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:35.044000 audit[2231]: AVC avc: denied { bpf } for pid=2231 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:35.044000 audit[2231]: AVC avc: denied { bpf } for pid=2231 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:35.044000 audit: BPF prog-id=91 op=LOAD Jul 10 00:37:35.044000 audit[2231]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffc7c1c9290 a2=94 a3=7ffc7c1c9470 items=0 ppid=2102 pid=2231 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:37:35.044000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Jul 10 00:37:35.045000 audit: BPF prog-id=91 op=UNLOAD Jul 10 00:37:35.092444 systemd-networkd[1022]: vxlan.calico: Link UP Jul 10 00:37:35.092455 systemd-networkd[1022]: vxlan.calico: Gained carrier Jul 10 00:37:35.116000 audit[2258]: AVC avc: denied { bpf } for pid=2258 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:35.116000 audit[2258]: AVC avc: denied { bpf } for pid=2258 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:35.116000 audit[2258]: AVC avc: denied { perfmon } for pid=2258 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:35.116000 audit[2258]: AVC avc: denied { perfmon } for pid=2258 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:35.116000 audit[2258]: AVC avc: denied { perfmon } for pid=2258 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:35.116000 audit[2258]: AVC avc: denied { perfmon } for pid=2258 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:35.116000 audit[2258]: AVC avc: denied { perfmon } for pid=2258 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:35.116000 audit[2258]: AVC avc: denied { bpf } for pid=2258 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:35.116000 audit[2258]: AVC avc: denied { bpf } for pid=2258 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:35.116000 audit: BPF prog-id=92 op=LOAD Jul 10 00:37:35.116000 audit[2258]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffd9ff0e830 a2=98 a3=0 items=0 ppid=2102 pid=2258 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:37:35.116000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 10 00:37:35.116000 audit: BPF prog-id=92 op=UNLOAD Jul 10 00:37:35.116000 audit[2258]: AVC avc: denied { bpf } for pid=2258 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:35.116000 audit[2258]: AVC avc: denied { bpf } for pid=2258 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:35.116000 audit[2258]: AVC avc: denied { perfmon } for pid=2258 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:35.116000 audit[2258]: AVC avc: denied { perfmon } for pid=2258 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:35.116000 audit[2258]: AVC avc: denied { perfmon } for pid=2258 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:35.116000 audit[2258]: AVC avc: denied { perfmon } for pid=2258 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:35.116000 audit[2258]: AVC avc: denied { perfmon } for pid=2258 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:35.116000 audit[2258]: AVC avc: denied { bpf } for pid=2258 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:35.116000 audit[2258]: AVC avc: denied { bpf } for pid=2258 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:35.116000 audit: BPF prog-id=93 op=LOAD Jul 10 00:37:35.116000 audit[2258]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffd9ff0e640 a2=94 a3=54428f items=0 ppid=2102 pid=2258 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:37:35.116000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 10 00:37:35.116000 audit: BPF prog-id=93 op=UNLOAD Jul 10 00:37:35.116000 audit[2258]: AVC avc: denied { bpf } for pid=2258 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:35.116000 audit[2258]: AVC avc: denied { bpf } for pid=2258 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:35.116000 audit[2258]: AVC avc: denied { perfmon } for pid=2258 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:35.116000 audit[2258]: AVC avc: denied { perfmon } for pid=2258 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:35.116000 audit[2258]: AVC avc: denied { perfmon } for pid=2258 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:35.116000 audit[2258]: AVC avc: denied { perfmon } for pid=2258 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:35.116000 audit[2258]: AVC avc: denied { perfmon } for pid=2258 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:35.116000 audit[2258]: AVC avc: denied { bpf } for pid=2258 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:35.116000 audit[2258]: AVC avc: denied { bpf } for pid=2258 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:35.116000 audit: BPF prog-id=94 op=LOAD Jul 10 00:37:35.116000 audit[2258]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffd9ff0e670 a2=94 a3=2 items=0 ppid=2102 pid=2258 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:37:35.116000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 10 00:37:35.116000 audit: BPF prog-id=94 op=UNLOAD Jul 10 00:37:35.116000 audit[2258]: AVC avc: denied { bpf } for pid=2258 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:35.116000 audit[2258]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffd9ff0e540 a2=28 a3=0 items=0 ppid=2102 pid=2258 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:37:35.116000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 10 00:37:35.116000 audit[2258]: AVC avc: denied { bpf } for pid=2258 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:35.116000 audit[2258]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd9ff0e570 a2=28 a3=0 items=0 ppid=2102 pid=2258 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:37:35.116000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 10 00:37:35.116000 audit[2258]: AVC avc: denied { bpf } for pid=2258 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:35.116000 audit[2258]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd9ff0e480 a2=28 a3=0 items=0 ppid=2102 pid=2258 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:37:35.116000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 10 00:37:35.116000 audit[2258]: AVC avc: denied { bpf } for pid=2258 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:35.116000 audit[2258]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffd9ff0e590 a2=28 a3=0 items=0 ppid=2102 pid=2258 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:37:35.116000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 10 00:37:35.116000 audit[2258]: AVC avc: denied { bpf } for pid=2258 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:35.116000 audit[2258]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffd9ff0e570 a2=28 a3=0 items=0 ppid=2102 pid=2258 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:37:35.116000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 10 00:37:35.116000 audit[2258]: AVC avc: denied { bpf } for pid=2258 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:35.116000 audit[2258]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffd9ff0e560 a2=28 a3=0 items=0 ppid=2102 pid=2258 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:37:35.116000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 10 00:37:35.116000 audit[2258]: AVC avc: denied { bpf } for pid=2258 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:35.116000 audit[2258]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffd9ff0e590 a2=28 a3=0 items=0 ppid=2102 pid=2258 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:37:35.116000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 10 00:37:35.116000 audit[2258]: AVC avc: denied { bpf } for pid=2258 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:35.116000 audit[2258]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd9ff0e570 a2=28 a3=0 items=0 ppid=2102 pid=2258 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:37:35.116000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 10 00:37:35.116000 audit[2258]: AVC avc: denied { bpf } for pid=2258 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:35.116000 audit[2258]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd9ff0e590 a2=28 a3=0 items=0 ppid=2102 pid=2258 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:37:35.116000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 10 00:37:35.116000 audit[2258]: AVC avc: denied { bpf } for pid=2258 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:35.116000 audit[2258]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd9ff0e560 a2=28 a3=0 items=0 ppid=2102 pid=2258 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:37:35.116000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 10 00:37:35.116000 audit[2258]: AVC avc: denied { bpf } for pid=2258 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:35.116000 audit[2258]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffd9ff0e5d0 a2=28 a3=0 items=0 ppid=2102 pid=2258 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:37:35.116000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 10 00:37:35.116000 audit[2258]: AVC avc: denied { bpf } for pid=2258 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:35.116000 audit[2258]: AVC avc: denied { bpf } for pid=2258 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:35.116000 audit[2258]: AVC avc: denied { perfmon } for pid=2258 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:35.116000 audit[2258]: AVC avc: denied { perfmon } for pid=2258 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:35.116000 audit[2258]: AVC avc: denied { perfmon } for pid=2258 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:35.116000 audit[2258]: AVC avc: denied { perfmon } for pid=2258 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:35.116000 audit[2258]: AVC avc: denied { perfmon } for pid=2258 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:35.116000 audit[2258]: AVC avc: denied { bpf } for pid=2258 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:35.116000 audit[2258]: AVC avc: denied { bpf } for pid=2258 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:35.116000 audit: BPF prog-id=95 op=LOAD Jul 10 00:37:35.116000 audit[2258]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffd9ff0e440 a2=94 a3=0 items=0 ppid=2102 pid=2258 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:37:35.116000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 10 00:37:35.117000 audit: BPF prog-id=95 op=UNLOAD Jul 10 00:37:35.117000 audit[2258]: AVC avc: denied { bpf } for pid=2258 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:35.117000 audit[2258]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=0 a1=7ffd9ff0e430 a2=50 a3=2800 items=0 ppid=2102 pid=2258 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:37:35.117000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 10 00:37:35.117000 audit[2258]: AVC avc: denied { bpf } for pid=2258 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:35.117000 audit[2258]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=0 a1=7ffd9ff0e430 a2=50 a3=2800 items=0 ppid=2102 pid=2258 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:37:35.117000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 10 00:37:35.117000 audit[2258]: AVC avc: denied { bpf } for pid=2258 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:35.117000 audit[2258]: AVC avc: denied { bpf } for pid=2258 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:35.117000 audit[2258]: AVC avc: denied { bpf } for pid=2258 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:35.117000 audit[2258]: AVC avc: denied { perfmon } for pid=2258 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:35.117000 audit[2258]: AVC avc: denied { perfmon } for pid=2258 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:35.117000 audit[2258]: AVC avc: denied { perfmon } for pid=2258 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:35.117000 audit[2258]: AVC avc: denied { perfmon } for pid=2258 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:35.117000 audit[2258]: AVC avc: denied { perfmon } for pid=2258 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:35.117000 audit[2258]: AVC avc: denied { bpf } for pid=2258 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:35.117000 audit[2258]: AVC avc: denied { bpf } for pid=2258 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:35.117000 audit: BPF prog-id=96 op=LOAD Jul 10 00:37:35.117000 audit[2258]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffd9ff0dc50 a2=94 a3=2 items=0 ppid=2102 pid=2258 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:37:35.117000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 10 00:37:35.117000 audit: BPF prog-id=96 op=UNLOAD Jul 10 00:37:35.117000 audit[2258]: AVC avc: denied { bpf } for pid=2258 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:35.117000 audit[2258]: AVC avc: denied { bpf } for pid=2258 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:35.117000 audit[2258]: AVC avc: denied { bpf } for pid=2258 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:35.117000 audit[2258]: AVC avc: denied { perfmon } for pid=2258 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:35.117000 audit[2258]: AVC avc: denied { perfmon } for pid=2258 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:35.117000 audit[2258]: AVC avc: denied { perfmon } for pid=2258 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:35.117000 audit[2258]: AVC avc: denied { perfmon } for pid=2258 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:35.117000 audit[2258]: AVC avc: denied { perfmon } for pid=2258 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:35.117000 audit[2258]: AVC avc: denied { bpf } for pid=2258 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:35.117000 audit[2258]: AVC avc: denied { bpf } for pid=2258 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:35.117000 audit: BPF prog-id=97 op=LOAD Jul 10 00:37:35.117000 audit[2258]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffd9ff0dd50 a2=94 a3=30 items=0 ppid=2102 pid=2258 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:37:35.117000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 10 00:37:35.124000 audit[2262]: AVC avc: denied { bpf } for pid=2262 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:35.124000 audit[2262]: AVC avc: denied { bpf } for pid=2262 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:35.124000 audit[2262]: AVC avc: denied { perfmon } for pid=2262 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:35.124000 audit[2262]: AVC avc: denied { perfmon } for pid=2262 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:35.124000 audit[2262]: AVC avc: denied { perfmon } for pid=2262 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:35.124000 audit[2262]: AVC avc: denied { perfmon } for pid=2262 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:35.124000 audit[2262]: AVC avc: denied { perfmon } for pid=2262 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:35.124000 audit[2262]: AVC avc: denied { bpf } for pid=2262 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:35.124000 audit[2262]: AVC avc: denied { bpf } for pid=2262 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:35.124000 audit: BPF prog-id=98 op=LOAD Jul 10 00:37:35.124000 audit[2262]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffc58d94d10 a2=98 a3=0 items=0 ppid=2102 pid=2262 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:37:35.124000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 10 00:37:35.124000 audit: BPF prog-id=98 op=UNLOAD Jul 10 00:37:35.124000 audit[2262]: AVC avc: denied { bpf } for pid=2262 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:35.124000 audit[2262]: AVC avc: denied { bpf } for pid=2262 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:35.124000 audit[2262]: AVC avc: denied { perfmon } for pid=2262 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:35.124000 audit[2262]: AVC avc: denied { perfmon } for pid=2262 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:35.124000 audit[2262]: AVC avc: denied { perfmon } for pid=2262 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:35.124000 audit[2262]: AVC avc: denied { perfmon } for pid=2262 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:35.124000 audit[2262]: AVC avc: denied { perfmon } for pid=2262 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:35.124000 audit[2262]: AVC avc: denied { bpf } for pid=2262 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:35.124000 audit[2262]: AVC avc: denied { bpf } for pid=2262 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:35.124000 audit: BPF prog-id=99 op=LOAD Jul 10 00:37:35.124000 audit[2262]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffc58d94b00 a2=94 a3=54428f items=0 ppid=2102 pid=2262 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:37:35.124000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 10 00:37:35.124000 audit: BPF prog-id=99 op=UNLOAD Jul 10 00:37:35.124000 audit[2262]: AVC avc: denied { bpf } for pid=2262 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:35.124000 audit[2262]: AVC avc: denied { bpf } for pid=2262 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:35.124000 audit[2262]: AVC avc: denied { perfmon } for pid=2262 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:35.124000 audit[2262]: AVC avc: denied { perfmon } for pid=2262 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:35.124000 audit[2262]: AVC avc: denied { perfmon } for pid=2262 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:35.124000 audit[2262]: AVC avc: denied { perfmon } for pid=2262 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:35.124000 audit[2262]: AVC avc: denied { perfmon } for pid=2262 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:35.124000 audit[2262]: AVC avc: denied { bpf } for pid=2262 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:35.124000 audit[2262]: AVC avc: denied { bpf } for pid=2262 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:35.124000 audit: BPF prog-id=100 op=LOAD Jul 10 00:37:35.124000 audit[2262]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffc58d94b30 a2=94 a3=2 items=0 ppid=2102 pid=2262 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:37:35.124000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 10 00:37:35.124000 audit: BPF prog-id=100 op=UNLOAD Jul 10 00:37:35.237000 audit[2262]: AVC avc: denied { bpf } for pid=2262 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:35.237000 audit[2262]: AVC avc: denied { bpf } for pid=2262 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:35.237000 audit[2262]: AVC avc: denied { perfmon } for pid=2262 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:35.237000 audit[2262]: AVC avc: denied { perfmon } for pid=2262 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:35.237000 audit[2262]: AVC avc: denied { perfmon } for pid=2262 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:35.237000 audit[2262]: AVC avc: denied { perfmon } for pid=2262 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:35.237000 audit[2262]: AVC avc: denied { perfmon } for pid=2262 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:35.237000 audit[2262]: AVC avc: denied { bpf } for pid=2262 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:35.237000 audit[2262]: AVC avc: denied { bpf } for pid=2262 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:35.237000 audit: BPF prog-id=101 op=LOAD Jul 10 00:37:35.237000 audit[2262]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffc58d949f0 a2=94 a3=1 items=0 ppid=2102 pid=2262 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:37:35.237000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 10 00:37:35.237000 audit: BPF prog-id=101 op=UNLOAD Jul 10 00:37:35.237000 audit[2262]: AVC avc: denied { perfmon } for pid=2262 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:35.237000 audit[2262]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffc58d94ac0 a2=50 a3=7ffc58d94ba0 items=0 ppid=2102 pid=2262 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:37:35.237000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 10 00:37:35.246268 kubelet[1438]: E0710 00:37:35.246190 1438 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 00:37:35.245000 audit[2262]: AVC avc: denied { bpf } for pid=2262 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:35.245000 audit[2262]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc58d94a00 a2=28 a3=0 items=0 ppid=2102 pid=2262 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:37:35.245000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 10 00:37:35.246000 audit[2262]: AVC avc: denied { bpf } for pid=2262 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:35.246000 audit[2262]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc58d94a30 a2=28 a3=0 items=0 ppid=2102 pid=2262 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:37:35.246000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 10 00:37:35.246000 audit[2262]: AVC avc: denied { bpf } for pid=2262 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:35.246000 audit[2262]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc58d94940 a2=28 a3=0 items=0 ppid=2102 pid=2262 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:37:35.246000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 10 00:37:35.246000 audit[2262]: AVC avc: denied { bpf } for pid=2262 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:35.246000 audit[2262]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc58d94a50 a2=28 a3=0 items=0 ppid=2102 pid=2262 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:37:35.246000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 10 00:37:35.246000 audit[2262]: AVC avc: denied { bpf } for pid=2262 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:35.246000 audit[2262]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc58d94a30 a2=28 a3=0 items=0 ppid=2102 pid=2262 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:37:35.246000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 10 00:37:35.246000 audit[2262]: AVC avc: denied { bpf } for pid=2262 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:35.246000 audit[2262]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc58d94a20 a2=28 a3=0 items=0 ppid=2102 pid=2262 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:37:35.246000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 10 00:37:35.246000 audit[2262]: AVC avc: denied { bpf } for pid=2262 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:35.246000 audit[2262]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc58d94a50 a2=28 a3=0 items=0 ppid=2102 pid=2262 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:37:35.246000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 10 00:37:35.246000 audit[2262]: AVC avc: denied { bpf } for pid=2262 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:35.246000 audit[2262]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc58d94a30 a2=28 a3=0 items=0 ppid=2102 pid=2262 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:37:35.246000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 10 00:37:35.246000 audit[2262]: AVC avc: denied { bpf } for pid=2262 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:35.246000 audit[2262]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc58d94a50 a2=28 a3=0 items=0 ppid=2102 pid=2262 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:37:35.246000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 10 00:37:35.246000 audit[2262]: AVC avc: denied { bpf } for pid=2262 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:35.246000 audit[2262]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc58d94a20 a2=28 a3=0 items=0 ppid=2102 pid=2262 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:37:35.246000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 10 00:37:35.246000 audit[2262]: AVC avc: denied { bpf } for pid=2262 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:35.246000 audit[2262]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc58d94a90 a2=28 a3=0 items=0 ppid=2102 pid=2262 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:37:35.246000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 10 00:37:35.246000 audit[2262]: AVC avc: denied { perfmon } for pid=2262 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:35.246000 audit[2262]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffc58d94840 a2=50 a3=1 items=0 ppid=2102 pid=2262 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:37:35.246000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 10 00:37:35.246000 audit[2262]: AVC avc: denied { bpf } for pid=2262 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:35.246000 audit[2262]: AVC avc: denied { bpf } for pid=2262 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:35.246000 audit[2262]: AVC avc: denied { perfmon } for pid=2262 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:35.246000 audit[2262]: AVC avc: denied { perfmon } for pid=2262 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:35.246000 audit[2262]: AVC avc: denied { perfmon } for pid=2262 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:35.246000 audit[2262]: AVC avc: denied { perfmon } for pid=2262 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:35.246000 audit[2262]: AVC avc: denied { perfmon } for pid=2262 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:35.246000 audit[2262]: AVC avc: denied { bpf } for pid=2262 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:35.246000 audit[2262]: AVC avc: denied { bpf } for pid=2262 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:35.246000 audit: BPF prog-id=102 op=LOAD Jul 10 00:37:35.246000 audit[2262]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffc58d94840 a2=94 a3=5 items=0 ppid=2102 pid=2262 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:37:35.246000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 10 00:37:35.246000 audit: BPF prog-id=102 op=UNLOAD Jul 10 00:37:35.246000 audit[2262]: AVC avc: denied { perfmon } for pid=2262 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:35.246000 audit[2262]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffc58d948f0 a2=50 a3=1 items=0 ppid=2102 pid=2262 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:37:35.246000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 10 00:37:35.246000 audit[2262]: AVC avc: denied { bpf } for pid=2262 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:35.246000 audit[2262]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffc58d94a10 a2=4 a3=38 items=0 ppid=2102 pid=2262 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:37:35.246000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 10 00:37:35.246000 audit[2262]: AVC avc: denied { bpf } for pid=2262 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:35.246000 audit[2262]: AVC avc: denied { bpf } for pid=2262 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:35.246000 audit[2262]: AVC avc: denied { perfmon } for pid=2262 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:35.246000 audit[2262]: AVC avc: denied { bpf } for pid=2262 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:35.246000 audit[2262]: AVC avc: denied { perfmon } for pid=2262 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:35.246000 audit[2262]: AVC avc: denied { perfmon } for pid=2262 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:35.246000 audit[2262]: AVC avc: denied { perfmon } for pid=2262 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:35.246000 audit[2262]: AVC avc: denied { perfmon } for pid=2262 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:35.246000 audit[2262]: AVC avc: denied { perfmon } for pid=2262 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:35.246000 audit[2262]: AVC avc: denied { bpf } for pid=2262 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:35.246000 audit[2262]: AVC avc: denied { confidentiality } for pid=2262 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:37:35.246000 audit[2262]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffc58d94a60 a2=94 a3=6 items=0 ppid=2102 pid=2262 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:37:35.246000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 10 00:37:35.246000 audit[2262]: AVC avc: denied { bpf } for pid=2262 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:35.246000 audit[2262]: AVC avc: denied { bpf } for pid=2262 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:35.246000 audit[2262]: AVC avc: denied { perfmon } for pid=2262 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:35.246000 audit[2262]: AVC avc: denied { bpf } for pid=2262 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:35.246000 audit[2262]: AVC avc: denied { perfmon } for pid=2262 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:35.246000 audit[2262]: AVC avc: denied { perfmon } for pid=2262 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:35.246000 audit[2262]: AVC avc: denied { perfmon } for pid=2262 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:35.246000 audit[2262]: AVC avc: denied { perfmon } for pid=2262 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:35.246000 audit[2262]: AVC avc: denied { perfmon } for pid=2262 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:35.246000 audit[2262]: AVC avc: denied { bpf } for pid=2262 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:35.246000 audit[2262]: AVC avc: denied { confidentiality } for pid=2262 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:37:35.246000 audit[2262]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffc58d94210 a2=94 a3=88 items=0 ppid=2102 pid=2262 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:37:35.246000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 10 00:37:35.247000 audit[2262]: AVC avc: denied { bpf } for pid=2262 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:35.247000 audit[2262]: AVC avc: denied { bpf } for pid=2262 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:35.247000 audit[2262]: AVC avc: denied { perfmon } for pid=2262 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:35.247000 audit[2262]: AVC avc: denied { bpf } for pid=2262 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:35.247000 audit[2262]: AVC avc: denied { perfmon } for pid=2262 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:35.247000 audit[2262]: AVC avc: denied { perfmon } for pid=2262 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:35.247000 audit[2262]: AVC avc: denied { perfmon } for pid=2262 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:35.247000 audit[2262]: AVC avc: denied { perfmon } for pid=2262 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:35.247000 audit[2262]: AVC avc: denied { perfmon } for pid=2262 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:35.247000 audit[2262]: AVC avc: denied { bpf } for pid=2262 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:35.247000 audit[2262]: AVC avc: denied { confidentiality } for pid=2262 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:37:35.247000 audit[2262]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffc58d94210 a2=94 a3=88 items=0 ppid=2102 pid=2262 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:37:35.247000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 10 00:37:35.247000 audit[2262]: AVC avc: denied { bpf } for pid=2262 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:35.247000 audit[2262]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffc58d95c40 a2=10 a3=208 items=0 ppid=2102 pid=2262 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:37:35.247000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 10 00:37:35.247000 audit[2262]: AVC avc: denied { bpf } for pid=2262 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:35.247000 audit[2262]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffc58d95ae0 a2=10 a3=3 items=0 ppid=2102 pid=2262 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:37:35.247000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 10 00:37:35.247000 audit[2262]: AVC avc: denied { bpf } for pid=2262 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:35.247000 audit[2262]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffc58d95a80 a2=10 a3=3 items=0 ppid=2102 pid=2262 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:37:35.247000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 10 00:37:35.247000 audit[2262]: AVC avc: denied { bpf } for pid=2262 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:35.247000 audit[2262]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffc58d95a80 a2=10 a3=7 items=0 ppid=2102 pid=2262 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:37:35.247000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 10 00:37:35.253000 audit: BPF prog-id=97 op=UNLOAD Jul 10 00:37:35.295000 audit[2289]: NETFILTER_CFG table=mangle:79 family=2 entries=16 op=nft_register_chain pid=2289 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 10 00:37:35.295000 audit[2289]: SYSCALL arch=c000003e syscall=46 success=yes exit=6868 a0=3 a1=7ffd5ea46f00 a2=0 a3=7ffd5ea46eec items=0 ppid=2102 pid=2289 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:37:35.295000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 10 00:37:35.302000 audit[2290]: NETFILTER_CFG table=nat:80 family=2 entries=15 op=nft_register_chain pid=2290 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 10 00:37:35.302000 audit[2290]: SYSCALL arch=c000003e syscall=46 success=yes exit=5084 a0=3 a1=7ffdccdd9fe0 a2=0 a3=7ffdccdd9fcc items=0 ppid=2102 pid=2290 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:37:35.302000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 10 00:37:35.306000 audit[2293]: NETFILTER_CFG table=filter:81 family=2 entries=39 op=nft_register_chain pid=2293 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 10 00:37:35.306000 audit[2293]: SYSCALL arch=c000003e syscall=46 success=yes exit=18968 a0=3 a1=7ffca8b2ab30 a2=0 a3=7ffca8b2ab1c items=0 ppid=2102 pid=2293 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:37:35.306000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 10 00:37:35.307000 audit[2288]: NETFILTER_CFG table=raw:82 family=2 entries=21 op=nft_register_chain pid=2288 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 10 00:37:35.307000 audit[2288]: SYSCALL arch=c000003e syscall=46 success=yes exit=8452 a0=3 a1=7ffe5579aa60 a2=0 a3=7ffe5579aa4c items=0 ppid=2102 pid=2288 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:37:35.307000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 10 00:37:36.246893 kubelet[1438]: E0710 00:37:36.246822 1438 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 00:37:36.688592 systemd-networkd[1022]: vxlan.calico: Gained IPv6LL Jul 10 00:37:37.247967 kubelet[1438]: E0710 00:37:37.247905 1438 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 00:37:37.311000 audit[2302]: NETFILTER_CFG table=filter:83 family=2 entries=10 op=nft_register_rule pid=2302 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 10 00:37:37.311000 audit[2302]: SYSCALL arch=c000003e syscall=46 success=yes exit=3760 a0=3 a1=7fff93702da0 a2=0 a3=7fff93702d8c items=0 ppid=1656 pid=2302 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:37:37.311000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 10 00:37:37.319000 audit[2302]: NETFILTER_CFG table=nat:84 family=2 entries=32 op=nft_register_rule pid=2302 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 10 00:37:37.319000 audit[2302]: SYSCALL arch=c000003e syscall=46 success=yes exit=10116 a0=3 a1=7fff93702da0 a2=0 a3=7fff93702d8c items=0 ppid=1656 pid=2302 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:37:37.319000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 10 00:37:37.342000 audit[2304]: NETFILTER_CFG table=filter:85 family=2 entries=10 op=nft_register_rule pid=2304 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 10 00:37:37.342000 audit[2304]: SYSCALL arch=c000003e syscall=46 success=yes exit=3760 a0=3 a1=7ffe259286f0 a2=0 a3=7ffe259286dc items=0 ppid=1656 pid=2304 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:37:37.342000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 10 00:37:37.349000 audit[2304]: NETFILTER_CFG table=nat:86 family=2 entries=24 op=nft_register_rule pid=2304 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 10 00:37:37.349000 audit[2304]: SYSCALL arch=c000003e syscall=46 success=yes exit=7308 a0=3 a1=7ffe259286f0 a2=0 a3=7ffe259286dc items=0 ppid=1656 pid=2304 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:37:37.349000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 10 00:37:38.248394 kubelet[1438]: E0710 00:37:38.248326 1438 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 00:37:39.249122 kubelet[1438]: E0710 00:37:39.249054 1438 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 00:37:40.249242 kubelet[1438]: E0710 00:37:40.249170 1438 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 00:37:41.250146 kubelet[1438]: E0710 00:37:41.250083 1438 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 00:37:41.664436 env[1200]: time="2025-07-10T00:37:41.664270277Z" level=info msg="StopPodSandbox for \"36380709dfe2d8e250ffd502ca39a5316c83dda329c5a12e4d2d7efae44883db\"" Jul 10 00:37:41.746635 env[1200]: 2025-07-10 00:37:41.715 [INFO][2324] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="36380709dfe2d8e250ffd502ca39a5316c83dda329c5a12e4d2d7efae44883db" Jul 10 00:37:41.746635 env[1200]: 2025-07-10 00:37:41.715 [INFO][2324] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="36380709dfe2d8e250ffd502ca39a5316c83dda329c5a12e4d2d7efae44883db" iface="eth0" netns="/var/run/netns/cni-856dc58e-a59a-445d-8603-f9411fbf6318" Jul 10 00:37:41.746635 env[1200]: 2025-07-10 00:37:41.715 [INFO][2324] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="36380709dfe2d8e250ffd502ca39a5316c83dda329c5a12e4d2d7efae44883db" iface="eth0" netns="/var/run/netns/cni-856dc58e-a59a-445d-8603-f9411fbf6318" Jul 10 00:37:41.746635 env[1200]: 2025-07-10 00:37:41.716 [INFO][2324] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="36380709dfe2d8e250ffd502ca39a5316c83dda329c5a12e4d2d7efae44883db" iface="eth0" netns="/var/run/netns/cni-856dc58e-a59a-445d-8603-f9411fbf6318" Jul 10 00:37:41.746635 env[1200]: 2025-07-10 00:37:41.716 [INFO][2324] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="36380709dfe2d8e250ffd502ca39a5316c83dda329c5a12e4d2d7efae44883db" Jul 10 00:37:41.746635 env[1200]: 2025-07-10 00:37:41.716 [INFO][2324] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="36380709dfe2d8e250ffd502ca39a5316c83dda329c5a12e4d2d7efae44883db" Jul 10 00:37:41.746635 env[1200]: 2025-07-10 00:37:41.736 [INFO][2333] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="36380709dfe2d8e250ffd502ca39a5316c83dda329c5a12e4d2d7efae44883db" HandleID="k8s-pod-network.36380709dfe2d8e250ffd502ca39a5316c83dda329c5a12e4d2d7efae44883db" Workload="10.0.0.41-k8s-csi--node--driver--76p48-eth0" Jul 10 00:37:41.746635 env[1200]: 2025-07-10 00:37:41.736 [INFO][2333] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Jul 10 00:37:41.746635 env[1200]: 2025-07-10 00:37:41.736 [INFO][2333] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Jul 10 00:37:41.746635 env[1200]: 2025-07-10 00:37:41.741 [WARNING][2333] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="36380709dfe2d8e250ffd502ca39a5316c83dda329c5a12e4d2d7efae44883db" HandleID="k8s-pod-network.36380709dfe2d8e250ffd502ca39a5316c83dda329c5a12e4d2d7efae44883db" Workload="10.0.0.41-k8s-csi--node--driver--76p48-eth0" Jul 10 00:37:41.746635 env[1200]: 2025-07-10 00:37:41.741 [INFO][2333] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="36380709dfe2d8e250ffd502ca39a5316c83dda329c5a12e4d2d7efae44883db" HandleID="k8s-pod-network.36380709dfe2d8e250ffd502ca39a5316c83dda329c5a12e4d2d7efae44883db" Workload="10.0.0.41-k8s-csi--node--driver--76p48-eth0" Jul 10 00:37:41.746635 env[1200]: 2025-07-10 00:37:41.743 [INFO][2333] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Jul 10 00:37:41.746635 env[1200]: 2025-07-10 00:37:41.745 [INFO][2324] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="36380709dfe2d8e250ffd502ca39a5316c83dda329c5a12e4d2d7efae44883db" Jul 10 00:37:41.747201 env[1200]: time="2025-07-10T00:37:41.746811394Z" level=info msg="TearDown network for sandbox \"36380709dfe2d8e250ffd502ca39a5316c83dda329c5a12e4d2d7efae44883db\" successfully" Jul 10 00:37:41.747201 env[1200]: time="2025-07-10T00:37:41.746861371Z" level=info msg="StopPodSandbox for \"36380709dfe2d8e250ffd502ca39a5316c83dda329c5a12e4d2d7efae44883db\" returns successfully" Jul 10 00:37:41.747834 env[1200]: time="2025-07-10T00:37:41.747789665Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-76p48,Uid:f42a92fd-7908-4d38-9f25-e2008b563302,Namespace:calico-system,Attempt:1,}" Jul 10 00:37:41.748422 systemd[1]: run-netns-cni\x2d856dc58e\x2da59a\x2d445d\x2d8603\x2df9411fbf6318.mount: Deactivated successfully. Jul 10 00:37:42.084307 systemd-networkd[1022]: cali4bf9d35c545: Link UP Jul 10 00:37:42.087902 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Jul 10 00:37:42.087967 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali4bf9d35c545: link becomes ready Jul 10 00:37:42.088269 systemd-networkd[1022]: cali4bf9d35c545: Gained carrier Jul 10 00:37:42.101345 env[1200]: 2025-07-10 00:37:42.032 [INFO][2340] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.0.0.41-k8s-csi--node--driver--76p48-eth0 csi-node-driver- calico-system f42a92fd-7908-4d38-9f25-e2008b563302 1202 0 2025-07-10 00:37:14 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:8967bcb6f k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:csi-node-driver] map[] [] [] []} {k8s 10.0.0.41 csi-node-driver-76p48 eth0 csi-node-driver [] [] [kns.calico-system ksa.calico-system.csi-node-driver] cali4bf9d35c545 [] [] }} ContainerID="271a79e55682823dd6f248d02f1eace94171aff290f946c4d244581ea54b6cd2" Namespace="calico-system" Pod="csi-node-driver-76p48" WorkloadEndpoint="10.0.0.41-k8s-csi--node--driver--76p48-" Jul 10 00:37:42.101345 env[1200]: 2025-07-10 00:37:42.032 [INFO][2340] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="271a79e55682823dd6f248d02f1eace94171aff290f946c4d244581ea54b6cd2" Namespace="calico-system" Pod="csi-node-driver-76p48" WorkloadEndpoint="10.0.0.41-k8s-csi--node--driver--76p48-eth0" Jul 10 00:37:42.101345 env[1200]: 2025-07-10 00:37:42.053 [INFO][2354] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="271a79e55682823dd6f248d02f1eace94171aff290f946c4d244581ea54b6cd2" HandleID="k8s-pod-network.271a79e55682823dd6f248d02f1eace94171aff290f946c4d244581ea54b6cd2" Workload="10.0.0.41-k8s-csi--node--driver--76p48-eth0" Jul 10 00:37:42.101345 env[1200]: 2025-07-10 00:37:42.053 [INFO][2354] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="271a79e55682823dd6f248d02f1eace94171aff290f946c4d244581ea54b6cd2" HandleID="k8s-pod-network.271a79e55682823dd6f248d02f1eace94171aff290f946c4d244581ea54b6cd2" Workload="10.0.0.41-k8s-csi--node--driver--76p48-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0001b3f20), Attrs:map[string]string{"namespace":"calico-system", "node":"10.0.0.41", "pod":"csi-node-driver-76p48", "timestamp":"2025-07-10 00:37:42.053145096 +0000 UTC"}, Hostname:"10.0.0.41", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Jul 10 00:37:42.101345 env[1200]: 2025-07-10 00:37:42.053 [INFO][2354] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Jul 10 00:37:42.101345 env[1200]: 2025-07-10 00:37:42.053 [INFO][2354] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Jul 10 00:37:42.101345 env[1200]: 2025-07-10 00:37:42.053 [INFO][2354] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.0.0.41' Jul 10 00:37:42.101345 env[1200]: 2025-07-10 00:37:42.059 [INFO][2354] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.271a79e55682823dd6f248d02f1eace94171aff290f946c4d244581ea54b6cd2" host="10.0.0.41" Jul 10 00:37:42.101345 env[1200]: 2025-07-10 00:37:42.063 [INFO][2354] ipam/ipam.go 394: Looking up existing affinities for host host="10.0.0.41" Jul 10 00:37:42.101345 env[1200]: 2025-07-10 00:37:42.067 [INFO][2354] ipam/ipam.go 511: Trying affinity for 192.168.46.128/26 host="10.0.0.41" Jul 10 00:37:42.101345 env[1200]: 2025-07-10 00:37:42.068 [INFO][2354] ipam/ipam.go 158: Attempting to load block cidr=192.168.46.128/26 host="10.0.0.41" Jul 10 00:37:42.101345 env[1200]: 2025-07-10 00:37:42.070 [INFO][2354] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.46.128/26 host="10.0.0.41" Jul 10 00:37:42.101345 env[1200]: 2025-07-10 00:37:42.070 [INFO][2354] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.46.128/26 handle="k8s-pod-network.271a79e55682823dd6f248d02f1eace94171aff290f946c4d244581ea54b6cd2" host="10.0.0.41" Jul 10 00:37:42.101345 env[1200]: 2025-07-10 00:37:42.071 [INFO][2354] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.271a79e55682823dd6f248d02f1eace94171aff290f946c4d244581ea54b6cd2 Jul 10 00:37:42.101345 env[1200]: 2025-07-10 00:37:42.075 [INFO][2354] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.46.128/26 handle="k8s-pod-network.271a79e55682823dd6f248d02f1eace94171aff290f946c4d244581ea54b6cd2" host="10.0.0.41" Jul 10 00:37:42.101345 env[1200]: 2025-07-10 00:37:42.079 [INFO][2354] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.46.129/26] block=192.168.46.128/26 handle="k8s-pod-network.271a79e55682823dd6f248d02f1eace94171aff290f946c4d244581ea54b6cd2" host="10.0.0.41" Jul 10 00:37:42.101345 env[1200]: 2025-07-10 00:37:42.079 [INFO][2354] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.46.129/26] handle="k8s-pod-network.271a79e55682823dd6f248d02f1eace94171aff290f946c4d244581ea54b6cd2" host="10.0.0.41" Jul 10 00:37:42.101345 env[1200]: 2025-07-10 00:37:42.079 [INFO][2354] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Jul 10 00:37:42.101345 env[1200]: 2025-07-10 00:37:42.079 [INFO][2354] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.46.129/26] IPv6=[] ContainerID="271a79e55682823dd6f248d02f1eace94171aff290f946c4d244581ea54b6cd2" HandleID="k8s-pod-network.271a79e55682823dd6f248d02f1eace94171aff290f946c4d244581ea54b6cd2" Workload="10.0.0.41-k8s-csi--node--driver--76p48-eth0" Jul 10 00:37:42.102492 env[1200]: 2025-07-10 00:37:42.081 [INFO][2340] cni-plugin/k8s.go 418: Populated endpoint ContainerID="271a79e55682823dd6f248d02f1eace94171aff290f946c4d244581ea54b6cd2" Namespace="calico-system" Pod="csi-node-driver-76p48" WorkloadEndpoint="10.0.0.41-k8s-csi--node--driver--76p48-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.41-k8s-csi--node--driver--76p48-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"f42a92fd-7908-4d38-9f25-e2008b563302", ResourceVersion:"1202", Generation:0, CreationTimestamp:time.Date(2025, time.July, 10, 0, 37, 14, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"8967bcb6f", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.41", ContainerID:"", Pod:"csi-node-driver-76p48", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.46.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali4bf9d35c545", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Jul 10 00:37:42.102492 env[1200]: 2025-07-10 00:37:42.081 [INFO][2340] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.46.129/32] ContainerID="271a79e55682823dd6f248d02f1eace94171aff290f946c4d244581ea54b6cd2" Namespace="calico-system" Pod="csi-node-driver-76p48" WorkloadEndpoint="10.0.0.41-k8s-csi--node--driver--76p48-eth0" Jul 10 00:37:42.102492 env[1200]: 2025-07-10 00:37:42.081 [INFO][2340] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali4bf9d35c545 ContainerID="271a79e55682823dd6f248d02f1eace94171aff290f946c4d244581ea54b6cd2" Namespace="calico-system" Pod="csi-node-driver-76p48" WorkloadEndpoint="10.0.0.41-k8s-csi--node--driver--76p48-eth0" Jul 10 00:37:42.102492 env[1200]: 2025-07-10 00:37:42.088 [INFO][2340] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="271a79e55682823dd6f248d02f1eace94171aff290f946c4d244581ea54b6cd2" Namespace="calico-system" Pod="csi-node-driver-76p48" WorkloadEndpoint="10.0.0.41-k8s-csi--node--driver--76p48-eth0" Jul 10 00:37:42.102492 env[1200]: 2025-07-10 00:37:42.088 [INFO][2340] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="271a79e55682823dd6f248d02f1eace94171aff290f946c4d244581ea54b6cd2" Namespace="calico-system" Pod="csi-node-driver-76p48" WorkloadEndpoint="10.0.0.41-k8s-csi--node--driver--76p48-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.41-k8s-csi--node--driver--76p48-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"f42a92fd-7908-4d38-9f25-e2008b563302", ResourceVersion:"1202", Generation:0, CreationTimestamp:time.Date(2025, time.July, 10, 0, 37, 14, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"8967bcb6f", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.41", ContainerID:"271a79e55682823dd6f248d02f1eace94171aff290f946c4d244581ea54b6cd2", Pod:"csi-node-driver-76p48", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.46.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali4bf9d35c545", MAC:"22:eb:71:e8:53:39", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Jul 10 00:37:42.102492 env[1200]: 2025-07-10 00:37:42.097 [INFO][2340] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="271a79e55682823dd6f248d02f1eace94171aff290f946c4d244581ea54b6cd2" Namespace="calico-system" Pod="csi-node-driver-76p48" WorkloadEndpoint="10.0.0.41-k8s-csi--node--driver--76p48-eth0" Jul 10 00:37:42.111476 env[1200]: time="2025-07-10T00:37:42.111352740Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 10 00:37:42.111476 env[1200]: time="2025-07-10T00:37:42.111391435Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 10 00:37:42.111476 env[1200]: time="2025-07-10T00:37:42.111440218Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 10 00:37:42.111808 env[1200]: time="2025-07-10T00:37:42.111762927Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/271a79e55682823dd6f248d02f1eace94171aff290f946c4d244581ea54b6cd2 pid=2382 runtime=io.containerd.runc.v2 Jul 10 00:37:42.129950 systemd[1]: Started cri-containerd-271a79e55682823dd6f248d02f1eace94171aff290f946c4d244581ea54b6cd2.scope. Jul 10 00:37:42.138449 kernel: kauditd_printk_skb: 614 callbacks suppressed Jul 10 00:37:42.138583 kernel: audit: type=1325 audit(1752107862.112:659): table=filter:87 family=2 entries=38 op=nft_register_chain pid=2378 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 10 00:37:42.138622 kernel: audit: type=1300 audit(1752107862.112:659): arch=c000003e syscall=46 success=yes exit=21364 a0=3 a1=7ffe3cc236d0 a2=0 a3=7ffe3cc236bc items=0 ppid=2102 pid=2378 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:37:42.112000 audit[2378]: NETFILTER_CFG table=filter:87 family=2 entries=38 op=nft_register_chain pid=2378 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 10 00:37:42.112000 audit[2378]: SYSCALL arch=c000003e syscall=46 success=yes exit=21364 a0=3 a1=7ffe3cc236d0 a2=0 a3=7ffe3cc236bc items=0 ppid=2102 pid=2378 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:37:42.112000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 10 00:37:42.143855 kernel: audit: type=1327 audit(1752107862.112:659): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 10 00:37:42.143902 kernel: audit: type=1400 audit(1752107862.136:660): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:42.136000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:42.149958 kernel: audit: type=1400 audit(1752107862.136:661): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:42.136000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:42.152923 kernel: audit: type=1400 audit(1752107862.136:662): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:42.136000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:42.136000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:42.153152 systemd-resolved[1148]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Jul 10 00:37:42.155864 kernel: audit: type=1400 audit(1752107862.136:663): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:42.155972 kernel: audit: type=1400 audit(1752107862.136:664): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:42.136000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:42.136000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:42.161484 kernel: audit: type=1400 audit(1752107862.136:665): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:42.161536 kernel: audit: type=1400 audit(1752107862.136:666): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:42.136000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:42.136000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:42.136000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:42.139000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:42.139000 audit: BPF prog-id=103 op=LOAD Jul 10 00:37:42.140000 audit[2392]: AVC avc: denied { bpf } for pid=2392 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:42.140000 audit[2392]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2382 pid=2392 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:37:42.140000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3237316137396535353638323832336464366632343864303266316561 Jul 10 00:37:42.140000 audit[2392]: AVC avc: denied { perfmon } for pid=2392 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:42.140000 audit[2392]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=2382 pid=2392 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:37:42.140000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3237316137396535353638323832336464366632343864303266316561 Jul 10 00:37:42.140000 audit[2392]: AVC avc: denied { bpf } for pid=2392 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:42.140000 audit[2392]: AVC avc: denied { bpf } for pid=2392 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:42.140000 audit[2392]: AVC avc: denied { bpf } for pid=2392 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:42.140000 audit[2392]: AVC avc: denied { perfmon } for pid=2392 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:42.140000 audit[2392]: AVC avc: denied { perfmon } for pid=2392 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:42.140000 audit[2392]: AVC avc: denied { perfmon } for pid=2392 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:42.140000 audit[2392]: AVC avc: denied { perfmon } for pid=2392 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:42.140000 audit[2392]: AVC avc: denied { perfmon } for pid=2392 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:42.140000 audit[2392]: AVC avc: denied { bpf } for pid=2392 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:42.140000 audit[2392]: AVC avc: denied { bpf } for pid=2392 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:42.140000 audit: BPF prog-id=104 op=LOAD Jul 10 00:37:42.140000 audit[2392]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000099390 items=0 ppid=2382 pid=2392 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:37:42.140000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3237316137396535353638323832336464366632343864303266316561 Jul 10 00:37:42.142000 audit[2392]: AVC avc: denied { bpf } for pid=2392 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:42.142000 audit[2392]: AVC avc: denied { bpf } for pid=2392 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:42.142000 audit[2392]: AVC avc: denied { perfmon } for pid=2392 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:42.142000 audit[2392]: AVC avc: denied { perfmon } for pid=2392 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:42.142000 audit[2392]: AVC avc: denied { perfmon } for pid=2392 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:42.142000 audit[2392]: AVC avc: denied { perfmon } for pid=2392 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:42.142000 audit[2392]: AVC avc: denied { perfmon } for pid=2392 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:42.142000 audit[2392]: AVC avc: denied { bpf } for pid=2392 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:42.142000 audit[2392]: AVC avc: denied { bpf } for pid=2392 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:42.142000 audit: BPF prog-id=105 op=LOAD Jul 10 00:37:42.142000 audit[2392]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0000993d8 items=0 ppid=2382 pid=2392 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:37:42.142000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3237316137396535353638323832336464366632343864303266316561 Jul 10 00:37:42.145000 audit: BPF prog-id=105 op=UNLOAD Jul 10 00:37:42.145000 audit: BPF prog-id=104 op=UNLOAD Jul 10 00:37:42.145000 audit[2392]: AVC avc: denied { bpf } for pid=2392 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:42.145000 audit[2392]: AVC avc: denied { bpf } for pid=2392 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:42.145000 audit[2392]: AVC avc: denied { bpf } for pid=2392 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:42.145000 audit[2392]: AVC avc: denied { perfmon } for pid=2392 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:42.145000 audit[2392]: AVC avc: denied { perfmon } for pid=2392 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:42.145000 audit[2392]: AVC avc: denied { perfmon } for pid=2392 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:42.145000 audit[2392]: AVC avc: denied { perfmon } for pid=2392 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:42.145000 audit[2392]: AVC avc: denied { perfmon } for pid=2392 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:42.145000 audit[2392]: AVC avc: denied { bpf } for pid=2392 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:42.145000 audit[2392]: AVC avc: denied { bpf } for pid=2392 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:42.145000 audit: BPF prog-id=106 op=LOAD Jul 10 00:37:42.145000 audit[2392]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0000997e8 items=0 ppid=2382 pid=2392 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:37:42.145000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3237316137396535353638323832336464366632343864303266316561 Jul 10 00:37:42.171073 env[1200]: time="2025-07-10T00:37:42.171031969Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-76p48,Uid:f42a92fd-7908-4d38-9f25-e2008b563302,Namespace:calico-system,Attempt:1,} returns sandbox id \"271a79e55682823dd6f248d02f1eace94171aff290f946c4d244581ea54b6cd2\"" Jul 10 00:37:42.172505 env[1200]: time="2025-07-10T00:37:42.172479496Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.30.2\"" Jul 10 00:37:42.250905 kubelet[1438]: E0710 00:37:42.250843 1438 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 00:37:43.251285 kubelet[1438]: E0710 00:37:43.251236 1438 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 00:37:43.721847 env[1200]: time="2025-07-10T00:37:43.721718117Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.30.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 10 00:37:43.723991 env[1200]: time="2025-07-10T00:37:43.723952911Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:c7fd1cc652979d89a51bbcc125e28e90c9815c0bd8f922a5bd36eed4e1927c6d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 10 00:37:43.725632 env[1200]: time="2025-07-10T00:37:43.725592783Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.30.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 10 00:37:43.727154 env[1200]: time="2025-07-10T00:37:43.727125250Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:e570128aa8067a2f06b96d3cc98afa2e0a4b9790b435ee36ca051c8e72aeb8d0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 10 00:37:43.727631 env[1200]: time="2025-07-10T00:37:43.727599749Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.30.2\" returns image reference \"sha256:c7fd1cc652979d89a51bbcc125e28e90c9815c0bd8f922a5bd36eed4e1927c6d\"" Jul 10 00:37:43.729201 env[1200]: time="2025-07-10T00:37:43.729162474Z" level=info msg="CreateContainer within sandbox \"271a79e55682823dd6f248d02f1eace94171aff290f946c4d244581ea54b6cd2\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" Jul 10 00:37:43.744740 env[1200]: time="2025-07-10T00:37:43.744702858Z" level=info msg="CreateContainer within sandbox \"271a79e55682823dd6f248d02f1eace94171aff290f946c4d244581ea54b6cd2\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"63a7f80ec8680103a6b07597bc19c77cb4458faee2229a26b691182c677e2623\"" Jul 10 00:37:43.745221 env[1200]: time="2025-07-10T00:37:43.745168059Z" level=info msg="StartContainer for \"63a7f80ec8680103a6b07597bc19c77cb4458faee2229a26b691182c677e2623\"" Jul 10 00:37:43.760432 systemd[1]: run-containerd-runc-k8s.io-63a7f80ec8680103a6b07597bc19c77cb4458faee2229a26b691182c677e2623-runc.HKRcz6.mount: Deactivated successfully. Jul 10 00:37:43.765117 systemd[1]: Started cri-containerd-63a7f80ec8680103a6b07597bc19c77cb4458faee2229a26b691182c677e2623.scope. Jul 10 00:37:43.775000 audit[2426]: AVC avc: denied { perfmon } for pid=2426 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:43.775000 audit[2426]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001476b0 a2=3c a3=7fe7e08831b8 items=0 ppid=2382 pid=2426 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:37:43.775000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3633613766383065633836383031303361366230373539376263313963 Jul 10 00:37:43.775000 audit[2426]: AVC avc: denied { bpf } for pid=2426 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:43.775000 audit[2426]: AVC avc: denied { bpf } for pid=2426 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:43.775000 audit[2426]: AVC avc: denied { bpf } for pid=2426 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:43.775000 audit[2426]: AVC avc: denied { perfmon } for pid=2426 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:43.775000 audit[2426]: AVC avc: denied { perfmon } for pid=2426 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:43.775000 audit[2426]: AVC avc: denied { perfmon } for pid=2426 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:43.775000 audit[2426]: AVC avc: denied { perfmon } for pid=2426 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:43.775000 audit[2426]: AVC avc: denied { perfmon } for pid=2426 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:43.775000 audit[2426]: AVC avc: denied { bpf } for pid=2426 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:43.775000 audit[2426]: AVC avc: denied { bpf } for pid=2426 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:43.775000 audit: BPF prog-id=107 op=LOAD Jul 10 00:37:43.775000 audit[2426]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001479d8 a2=78 a3=c000271fa8 items=0 ppid=2382 pid=2426 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:37:43.775000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3633613766383065633836383031303361366230373539376263313963 Jul 10 00:37:43.775000 audit[2426]: AVC avc: denied { bpf } for pid=2426 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:43.775000 audit[2426]: AVC avc: denied { bpf } for pid=2426 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:43.775000 audit[2426]: AVC avc: denied { perfmon } for pid=2426 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:43.775000 audit[2426]: AVC avc: denied { perfmon } for pid=2426 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:43.775000 audit[2426]: AVC avc: denied { perfmon } for pid=2426 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:43.775000 audit[2426]: AVC avc: denied { perfmon } for pid=2426 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:43.775000 audit[2426]: AVC avc: denied { perfmon } for pid=2426 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:43.775000 audit[2426]: AVC avc: denied { bpf } for pid=2426 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:43.775000 audit[2426]: AVC avc: denied { bpf } for pid=2426 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:43.775000 audit: BPF prog-id=108 op=LOAD Jul 10 00:37:43.775000 audit[2426]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000147770 a2=78 a3=c000271ff8 items=0 ppid=2382 pid=2426 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:37:43.775000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3633613766383065633836383031303361366230373539376263313963 Jul 10 00:37:43.775000 audit: BPF prog-id=108 op=UNLOAD Jul 10 00:37:43.775000 audit: BPF prog-id=107 op=UNLOAD Jul 10 00:37:43.775000 audit[2426]: AVC avc: denied { bpf } for pid=2426 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:43.775000 audit[2426]: AVC avc: denied { bpf } for pid=2426 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:43.775000 audit[2426]: AVC avc: denied { bpf } for pid=2426 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:43.775000 audit[2426]: AVC avc: denied { perfmon } for pid=2426 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:43.775000 audit[2426]: AVC avc: denied { perfmon } for pid=2426 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:43.775000 audit[2426]: AVC avc: denied { perfmon } for pid=2426 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:43.775000 audit[2426]: AVC avc: denied { perfmon } for pid=2426 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:43.775000 audit[2426]: AVC avc: denied { perfmon } for pid=2426 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:43.775000 audit[2426]: AVC avc: denied { bpf } for pid=2426 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:43.775000 audit[2426]: AVC avc: denied { bpf } for pid=2426 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:43.775000 audit: BPF prog-id=109 op=LOAD Jul 10 00:37:43.775000 audit[2426]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000147c30 a2=78 a3=c00035a088 items=0 ppid=2382 pid=2426 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:37:43.775000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3633613766383065633836383031303361366230373539376263313963 Jul 10 00:37:43.792997 systemd-networkd[1022]: cali4bf9d35c545: Gained IPv6LL Jul 10 00:37:43.839314 env[1200]: time="2025-07-10T00:37:43.839256599Z" level=info msg="StartContainer for \"63a7f80ec8680103a6b07597bc19c77cb4458faee2229a26b691182c677e2623\" returns successfully" Jul 10 00:37:43.840392 env[1200]: time="2025-07-10T00:37:43.840360605Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.2\"" Jul 10 00:37:44.252110 kubelet[1438]: E0710 00:37:44.252043 1438 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 00:37:45.252680 kubelet[1438]: E0710 00:37:45.252617 1438 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 00:37:45.664599 env[1200]: time="2025-07-10T00:37:45.664246698Z" level=info msg="StopPodSandbox for \"1fcb6fe1dbf10c3282c690abef16ec7281c5aea339fe6378e3f92bac9e19b611\"" Jul 10 00:37:45.732144 env[1200]: 2025-07-10 00:37:45.701 [INFO][2470] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="1fcb6fe1dbf10c3282c690abef16ec7281c5aea339fe6378e3f92bac9e19b611" Jul 10 00:37:45.732144 env[1200]: 2025-07-10 00:37:45.701 [INFO][2470] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="1fcb6fe1dbf10c3282c690abef16ec7281c5aea339fe6378e3f92bac9e19b611" iface="eth0" netns="/var/run/netns/cni-9fc02647-0292-2f98-4f10-6918c94ee88d" Jul 10 00:37:45.732144 env[1200]: 2025-07-10 00:37:45.701 [INFO][2470] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="1fcb6fe1dbf10c3282c690abef16ec7281c5aea339fe6378e3f92bac9e19b611" iface="eth0" netns="/var/run/netns/cni-9fc02647-0292-2f98-4f10-6918c94ee88d" Jul 10 00:37:45.732144 env[1200]: 2025-07-10 00:37:45.701 [INFO][2470] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="1fcb6fe1dbf10c3282c690abef16ec7281c5aea339fe6378e3f92bac9e19b611" iface="eth0" netns="/var/run/netns/cni-9fc02647-0292-2f98-4f10-6918c94ee88d" Jul 10 00:37:45.732144 env[1200]: 2025-07-10 00:37:45.701 [INFO][2470] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="1fcb6fe1dbf10c3282c690abef16ec7281c5aea339fe6378e3f92bac9e19b611" Jul 10 00:37:45.732144 env[1200]: 2025-07-10 00:37:45.701 [INFO][2470] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="1fcb6fe1dbf10c3282c690abef16ec7281c5aea339fe6378e3f92bac9e19b611" Jul 10 00:37:45.732144 env[1200]: 2025-07-10 00:37:45.722 [INFO][2478] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="1fcb6fe1dbf10c3282c690abef16ec7281c5aea339fe6378e3f92bac9e19b611" HandleID="k8s-pod-network.1fcb6fe1dbf10c3282c690abef16ec7281c5aea339fe6378e3f92bac9e19b611" Workload="10.0.0.41-k8s-nginx--deployment--7fcdb87857--sr5g8-eth0" Jul 10 00:37:45.732144 env[1200]: 2025-07-10 00:37:45.722 [INFO][2478] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Jul 10 00:37:45.732144 env[1200]: 2025-07-10 00:37:45.722 [INFO][2478] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Jul 10 00:37:45.732144 env[1200]: 2025-07-10 00:37:45.727 [WARNING][2478] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="1fcb6fe1dbf10c3282c690abef16ec7281c5aea339fe6378e3f92bac9e19b611" HandleID="k8s-pod-network.1fcb6fe1dbf10c3282c690abef16ec7281c5aea339fe6378e3f92bac9e19b611" Workload="10.0.0.41-k8s-nginx--deployment--7fcdb87857--sr5g8-eth0" Jul 10 00:37:45.732144 env[1200]: 2025-07-10 00:37:45.728 [INFO][2478] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="1fcb6fe1dbf10c3282c690abef16ec7281c5aea339fe6378e3f92bac9e19b611" HandleID="k8s-pod-network.1fcb6fe1dbf10c3282c690abef16ec7281c5aea339fe6378e3f92bac9e19b611" Workload="10.0.0.41-k8s-nginx--deployment--7fcdb87857--sr5g8-eth0" Jul 10 00:37:45.732144 env[1200]: 2025-07-10 00:37:45.729 [INFO][2478] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Jul 10 00:37:45.732144 env[1200]: 2025-07-10 00:37:45.730 [INFO][2470] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="1fcb6fe1dbf10c3282c690abef16ec7281c5aea339fe6378e3f92bac9e19b611" Jul 10 00:37:45.733903 systemd[1]: run-netns-cni\x2d9fc02647\x2d0292\x2d2f98\x2d4f10\x2d6918c94ee88d.mount: Deactivated successfully. Jul 10 00:37:45.734616 env[1200]: time="2025-07-10T00:37:45.734569111Z" level=info msg="TearDown network for sandbox \"1fcb6fe1dbf10c3282c690abef16ec7281c5aea339fe6378e3f92bac9e19b611\" successfully" Jul 10 00:37:45.734673 env[1200]: time="2025-07-10T00:37:45.734615148Z" level=info msg="StopPodSandbox for \"1fcb6fe1dbf10c3282c690abef16ec7281c5aea339fe6378e3f92bac9e19b611\" returns successfully" Jul 10 00:37:45.735165 env[1200]: time="2025-07-10T00:37:45.735141384Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-7fcdb87857-sr5g8,Uid:adb6abc2-1bb5-4ddf-8323-5dacb38a0c9b,Namespace:default,Attempt:1,}" Jul 10 00:37:45.953161 systemd-networkd[1022]: calia9976f19339: Link UP Jul 10 00:37:45.955899 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Jul 10 00:37:45.955977 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calia9976f19339: link becomes ready Jul 10 00:37:45.956010 env[1200]: time="2025-07-10T00:37:45.955803142Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.30.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 10 00:37:45.956310 systemd-networkd[1022]: calia9976f19339: Gained carrier Jul 10 00:37:45.958820 env[1200]: time="2025-07-10T00:37:45.958783078Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:9e48822a4fe26f4ed9231b361fdd1357ea3567f1fc0a8db4d616622fe570a866,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 10 00:37:45.960492 env[1200]: time="2025-07-10T00:37:45.960457860Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.30.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 10 00:37:45.962055 env[1200]: time="2025-07-10T00:37:45.962020577Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:8fec2de12dfa51bae89d941938a07af2598eb8bfcab55d0dded1d9c193d7b99f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 10 00:37:45.962663 env[1200]: time="2025-07-10T00:37:45.962626656Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.2\" returns image reference \"sha256:9e48822a4fe26f4ed9231b361fdd1357ea3567f1fc0a8db4d616622fe570a866\"" Jul 10 00:37:45.967540 env[1200]: 2025-07-10 00:37:45.781 [INFO][2486] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.0.0.41-k8s-nginx--deployment--7fcdb87857--sr5g8-eth0 nginx-deployment-7fcdb87857- default adb6abc2-1bb5-4ddf-8323-5dacb38a0c9b 1222 0 2025-07-10 00:37:30 +0000 UTC map[app:nginx pod-template-hash:7fcdb87857 projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 10.0.0.41 nginx-deployment-7fcdb87857-sr5g8 eth0 default [] [] [kns.default ksa.default.default] calia9976f19339 [] [] }} ContainerID="79bcd3464abfb3491ed2da83b03bc1a41ae4cae0fc73c528badbd44b60484eb6" Namespace="default" Pod="nginx-deployment-7fcdb87857-sr5g8" WorkloadEndpoint="10.0.0.41-k8s-nginx--deployment--7fcdb87857--sr5g8-" Jul 10 00:37:45.967540 env[1200]: 2025-07-10 00:37:45.781 [INFO][2486] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="79bcd3464abfb3491ed2da83b03bc1a41ae4cae0fc73c528badbd44b60484eb6" Namespace="default" Pod="nginx-deployment-7fcdb87857-sr5g8" WorkloadEndpoint="10.0.0.41-k8s-nginx--deployment--7fcdb87857--sr5g8-eth0" Jul 10 00:37:45.967540 env[1200]: 2025-07-10 00:37:45.804 [INFO][2502] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="79bcd3464abfb3491ed2da83b03bc1a41ae4cae0fc73c528badbd44b60484eb6" HandleID="k8s-pod-network.79bcd3464abfb3491ed2da83b03bc1a41ae4cae0fc73c528badbd44b60484eb6" Workload="10.0.0.41-k8s-nginx--deployment--7fcdb87857--sr5g8-eth0" Jul 10 00:37:45.967540 env[1200]: 2025-07-10 00:37:45.804 [INFO][2502] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="79bcd3464abfb3491ed2da83b03bc1a41ae4cae0fc73c528badbd44b60484eb6" HandleID="k8s-pod-network.79bcd3464abfb3491ed2da83b03bc1a41ae4cae0fc73c528badbd44b60484eb6" Workload="10.0.0.41-k8s-nginx--deployment--7fcdb87857--sr5g8-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002c9280), Attrs:map[string]string{"namespace":"default", "node":"10.0.0.41", "pod":"nginx-deployment-7fcdb87857-sr5g8", "timestamp":"2025-07-10 00:37:45.804572022 +0000 UTC"}, Hostname:"10.0.0.41", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Jul 10 00:37:45.967540 env[1200]: 2025-07-10 00:37:45.805 [INFO][2502] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Jul 10 00:37:45.967540 env[1200]: 2025-07-10 00:37:45.805 [INFO][2502] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Jul 10 00:37:45.967540 env[1200]: 2025-07-10 00:37:45.805 [INFO][2502] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.0.0.41' Jul 10 00:37:45.967540 env[1200]: 2025-07-10 00:37:45.811 [INFO][2502] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.79bcd3464abfb3491ed2da83b03bc1a41ae4cae0fc73c528badbd44b60484eb6" host="10.0.0.41" Jul 10 00:37:45.967540 env[1200]: 2025-07-10 00:37:45.817 [INFO][2502] ipam/ipam.go 394: Looking up existing affinities for host host="10.0.0.41" Jul 10 00:37:45.967540 env[1200]: 2025-07-10 00:37:45.826 [INFO][2502] ipam/ipam.go 511: Trying affinity for 192.168.46.128/26 host="10.0.0.41" Jul 10 00:37:45.967540 env[1200]: 2025-07-10 00:37:45.828 [INFO][2502] ipam/ipam.go 158: Attempting to load block cidr=192.168.46.128/26 host="10.0.0.41" Jul 10 00:37:45.967540 env[1200]: 2025-07-10 00:37:45.831 [INFO][2502] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.46.128/26 host="10.0.0.41" Jul 10 00:37:45.967540 env[1200]: 2025-07-10 00:37:45.831 [INFO][2502] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.46.128/26 handle="k8s-pod-network.79bcd3464abfb3491ed2da83b03bc1a41ae4cae0fc73c528badbd44b60484eb6" host="10.0.0.41" Jul 10 00:37:45.967540 env[1200]: 2025-07-10 00:37:45.833 [INFO][2502] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.79bcd3464abfb3491ed2da83b03bc1a41ae4cae0fc73c528badbd44b60484eb6 Jul 10 00:37:45.967540 env[1200]: 2025-07-10 00:37:45.838 [INFO][2502] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.46.128/26 handle="k8s-pod-network.79bcd3464abfb3491ed2da83b03bc1a41ae4cae0fc73c528badbd44b60484eb6" host="10.0.0.41" Jul 10 00:37:45.967540 env[1200]: 2025-07-10 00:37:45.949 [INFO][2502] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.46.130/26] block=192.168.46.128/26 handle="k8s-pod-network.79bcd3464abfb3491ed2da83b03bc1a41ae4cae0fc73c528badbd44b60484eb6" host="10.0.0.41" Jul 10 00:37:45.967540 env[1200]: 2025-07-10 00:37:45.949 [INFO][2502] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.46.130/26] handle="k8s-pod-network.79bcd3464abfb3491ed2da83b03bc1a41ae4cae0fc73c528badbd44b60484eb6" host="10.0.0.41" Jul 10 00:37:45.967540 env[1200]: 2025-07-10 00:37:45.950 [INFO][2502] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Jul 10 00:37:45.967540 env[1200]: 2025-07-10 00:37:45.950 [INFO][2502] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.46.130/26] IPv6=[] ContainerID="79bcd3464abfb3491ed2da83b03bc1a41ae4cae0fc73c528badbd44b60484eb6" HandleID="k8s-pod-network.79bcd3464abfb3491ed2da83b03bc1a41ae4cae0fc73c528badbd44b60484eb6" Workload="10.0.0.41-k8s-nginx--deployment--7fcdb87857--sr5g8-eth0" Jul 10 00:37:45.968371 env[1200]: 2025-07-10 00:37:45.951 [INFO][2486] cni-plugin/k8s.go 418: Populated endpoint ContainerID="79bcd3464abfb3491ed2da83b03bc1a41ae4cae0fc73c528badbd44b60484eb6" Namespace="default" Pod="nginx-deployment-7fcdb87857-sr5g8" WorkloadEndpoint="10.0.0.41-k8s-nginx--deployment--7fcdb87857--sr5g8-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.41-k8s-nginx--deployment--7fcdb87857--sr5g8-eth0", GenerateName:"nginx-deployment-7fcdb87857-", Namespace:"default", SelfLink:"", UID:"adb6abc2-1bb5-4ddf-8323-5dacb38a0c9b", ResourceVersion:"1222", Generation:0, CreationTimestamp:time.Date(2025, time.July, 10, 0, 37, 30, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"7fcdb87857", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.41", ContainerID:"", Pod:"nginx-deployment-7fcdb87857-sr5g8", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.46.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"calia9976f19339", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Jul 10 00:37:45.968371 env[1200]: 2025-07-10 00:37:45.951 [INFO][2486] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.46.130/32] ContainerID="79bcd3464abfb3491ed2da83b03bc1a41ae4cae0fc73c528badbd44b60484eb6" Namespace="default" Pod="nginx-deployment-7fcdb87857-sr5g8" WorkloadEndpoint="10.0.0.41-k8s-nginx--deployment--7fcdb87857--sr5g8-eth0" Jul 10 00:37:45.968371 env[1200]: 2025-07-10 00:37:45.951 [INFO][2486] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calia9976f19339 ContainerID="79bcd3464abfb3491ed2da83b03bc1a41ae4cae0fc73c528badbd44b60484eb6" Namespace="default" Pod="nginx-deployment-7fcdb87857-sr5g8" WorkloadEndpoint="10.0.0.41-k8s-nginx--deployment--7fcdb87857--sr5g8-eth0" Jul 10 00:37:45.968371 env[1200]: 2025-07-10 00:37:45.956 [INFO][2486] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="79bcd3464abfb3491ed2da83b03bc1a41ae4cae0fc73c528badbd44b60484eb6" Namespace="default" Pod="nginx-deployment-7fcdb87857-sr5g8" WorkloadEndpoint="10.0.0.41-k8s-nginx--deployment--7fcdb87857--sr5g8-eth0" Jul 10 00:37:45.968371 env[1200]: 2025-07-10 00:37:45.956 [INFO][2486] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="79bcd3464abfb3491ed2da83b03bc1a41ae4cae0fc73c528badbd44b60484eb6" Namespace="default" Pod="nginx-deployment-7fcdb87857-sr5g8" WorkloadEndpoint="10.0.0.41-k8s-nginx--deployment--7fcdb87857--sr5g8-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.41-k8s-nginx--deployment--7fcdb87857--sr5g8-eth0", GenerateName:"nginx-deployment-7fcdb87857-", Namespace:"default", SelfLink:"", UID:"adb6abc2-1bb5-4ddf-8323-5dacb38a0c9b", ResourceVersion:"1222", Generation:0, CreationTimestamp:time.Date(2025, time.July, 10, 0, 37, 30, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"7fcdb87857", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.41", ContainerID:"79bcd3464abfb3491ed2da83b03bc1a41ae4cae0fc73c528badbd44b60484eb6", Pod:"nginx-deployment-7fcdb87857-sr5g8", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.46.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"calia9976f19339", MAC:"16:00:56:eb:fc:33", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Jul 10 00:37:45.968371 env[1200]: 2025-07-10 00:37:45.964 [INFO][2486] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="79bcd3464abfb3491ed2da83b03bc1a41ae4cae0fc73c528badbd44b60484eb6" Namespace="default" Pod="nginx-deployment-7fcdb87857-sr5g8" WorkloadEndpoint="10.0.0.41-k8s-nginx--deployment--7fcdb87857--sr5g8-eth0" Jul 10 00:37:45.968371 env[1200]: time="2025-07-10T00:37:45.967921066Z" level=info msg="CreateContainer within sandbox \"271a79e55682823dd6f248d02f1eace94171aff290f946c4d244581ea54b6cd2\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" Jul 10 00:37:45.973000 audit[2521]: NETFILTER_CFG table=filter:88 family=2 entries=42 op=nft_register_chain pid=2521 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 10 00:37:45.973000 audit[2521]: SYSCALL arch=c000003e syscall=46 success=yes exit=22512 a0=3 a1=7ffc7fb1a4e0 a2=0 a3=7ffc7fb1a4cc items=0 ppid=2102 pid=2521 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:37:45.973000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 10 00:37:45.977216 env[1200]: time="2025-07-10T00:37:45.977164374Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 10 00:37:45.977216 env[1200]: time="2025-07-10T00:37:45.977200795Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 10 00:37:45.977216 env[1200]: time="2025-07-10T00:37:45.977210623Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 10 00:37:45.977373 env[1200]: time="2025-07-10T00:37:45.977315323Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/79bcd3464abfb3491ed2da83b03bc1a41ae4cae0fc73c528badbd44b60484eb6 pid=2528 runtime=io.containerd.runc.v2 Jul 10 00:37:45.984607 env[1200]: time="2025-07-10T00:37:45.984560192Z" level=info msg="CreateContainer within sandbox \"271a79e55682823dd6f248d02f1eace94171aff290f946c4d244581ea54b6cd2\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"913b78a8f19eecd14986b46d9a3e12826b955493d453c9b1d1cf5b800854d52b\"" Jul 10 00:37:45.985311 env[1200]: time="2025-07-10T00:37:45.985270179Z" level=info msg="StartContainer for \"913b78a8f19eecd14986b46d9a3e12826b955493d453c9b1d1cf5b800854d52b\"" Jul 10 00:37:45.992153 systemd[1]: Started cri-containerd-79bcd3464abfb3491ed2da83b03bc1a41ae4cae0fc73c528badbd44b60484eb6.scope. Jul 10 00:37:46.003128 systemd[1]: Started cri-containerd-913b78a8f19eecd14986b46d9a3e12826b955493d453c9b1d1cf5b800854d52b.scope. Jul 10 00:37:46.005000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:46.005000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:46.005000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:46.005000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:46.005000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:46.005000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:46.005000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:46.005000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:46.005000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:46.005000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:46.005000 audit: BPF prog-id=110 op=LOAD Jul 10 00:37:46.006000 audit[2538]: AVC avc: denied { bpf } for pid=2538 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:46.006000 audit[2538]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2528 pid=2538 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:37:46.006000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3739626364333436346162666233343931656432646138336230336263 Jul 10 00:37:46.006000 audit[2538]: AVC avc: denied { perfmon } for pid=2538 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:46.006000 audit[2538]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=2528 pid=2538 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:37:46.006000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3739626364333436346162666233343931656432646138336230336263 Jul 10 00:37:46.006000 audit[2538]: AVC avc: denied { bpf } for pid=2538 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:46.006000 audit[2538]: AVC avc: denied { bpf } for pid=2538 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:46.006000 audit[2538]: AVC avc: denied { bpf } for pid=2538 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:46.006000 audit[2538]: AVC avc: denied { perfmon } for pid=2538 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:46.006000 audit[2538]: AVC avc: denied { perfmon } for pid=2538 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:46.006000 audit[2538]: AVC avc: denied { perfmon } for pid=2538 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:46.006000 audit[2538]: AVC avc: denied { perfmon } for pid=2538 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:46.006000 audit[2538]: AVC avc: denied { perfmon } for pid=2538 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:46.006000 audit[2538]: AVC avc: denied { bpf } for pid=2538 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:46.006000 audit[2538]: AVC avc: denied { bpf } for pid=2538 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:46.006000 audit: BPF prog-id=111 op=LOAD Jul 10 00:37:46.006000 audit[2538]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0000a3440 items=0 ppid=2528 pid=2538 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:37:46.006000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3739626364333436346162666233343931656432646138336230336263 Jul 10 00:37:46.006000 audit[2538]: AVC avc: denied { bpf } for pid=2538 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:46.006000 audit[2538]: AVC avc: denied { bpf } for pid=2538 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:46.006000 audit[2538]: AVC avc: denied { perfmon } for pid=2538 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:46.006000 audit[2538]: AVC avc: denied { perfmon } for pid=2538 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:46.006000 audit[2538]: AVC avc: denied { perfmon } for pid=2538 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:46.006000 audit[2538]: AVC avc: denied { perfmon } for pid=2538 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:46.006000 audit[2538]: AVC avc: denied { perfmon } for pid=2538 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:46.006000 audit[2538]: AVC avc: denied { bpf } for pid=2538 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:46.006000 audit[2538]: AVC avc: denied { bpf } for pid=2538 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:46.006000 audit: BPF prog-id=112 op=LOAD Jul 10 00:37:46.006000 audit[2538]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0000a3488 items=0 ppid=2528 pid=2538 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:37:46.006000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3739626364333436346162666233343931656432646138336230336263 Jul 10 00:37:46.008000 audit: BPF prog-id=112 op=UNLOAD Jul 10 00:37:46.008000 audit: BPF prog-id=111 op=UNLOAD Jul 10 00:37:46.008000 audit[2538]: AVC avc: denied { bpf } for pid=2538 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:46.008000 audit[2538]: AVC avc: denied { bpf } for pid=2538 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:46.008000 audit[2538]: AVC avc: denied { bpf } for pid=2538 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:46.008000 audit[2538]: AVC avc: denied { perfmon } for pid=2538 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:46.008000 audit[2538]: AVC avc: denied { perfmon } for pid=2538 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:46.008000 audit[2538]: AVC avc: denied { perfmon } for pid=2538 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:46.008000 audit[2538]: AVC avc: denied { perfmon } for pid=2538 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:46.008000 audit[2538]: AVC avc: denied { perfmon } for pid=2538 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:46.008000 audit[2538]: AVC avc: denied { bpf } for pid=2538 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:46.008000 audit[2538]: AVC avc: denied { bpf } for pid=2538 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:46.008000 audit: BPF prog-id=113 op=LOAD Jul 10 00:37:46.008000 audit[2538]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0000a3898 items=0 ppid=2528 pid=2538 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:37:46.008000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3739626364333436346162666233343931656432646138336230336263 Jul 10 00:37:46.011083 systemd-resolved[1148]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Jul 10 00:37:46.015000 audit[2554]: AVC avc: denied { perfmon } for pid=2554 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:46.015000 audit[2554]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014d6b0 a2=3c a3=7f8070f53a88 items=0 ppid=2382 pid=2554 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:37:46.015000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3931336237386138663139656563643134393836623436643961336531 Jul 10 00:37:46.015000 audit[2554]: AVC avc: denied { bpf } for pid=2554 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:46.015000 audit[2554]: AVC avc: denied { bpf } for pid=2554 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:46.015000 audit[2554]: AVC avc: denied { bpf } for pid=2554 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:46.015000 audit[2554]: AVC avc: denied { perfmon } for pid=2554 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:46.015000 audit[2554]: AVC avc: denied { perfmon } for pid=2554 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:46.015000 audit[2554]: AVC avc: denied { perfmon } for pid=2554 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:46.015000 audit[2554]: AVC avc: denied { perfmon } for pid=2554 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:46.015000 audit[2554]: AVC avc: denied { perfmon } for pid=2554 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:46.015000 audit[2554]: AVC avc: denied { bpf } for pid=2554 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:46.015000 audit[2554]: AVC avc: denied { bpf } for pid=2554 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:46.015000 audit: BPF prog-id=114 op=LOAD Jul 10 00:37:46.015000 audit[2554]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014d9d8 a2=78 a3=c00028c888 items=0 ppid=2382 pid=2554 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:37:46.015000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3931336237386138663139656563643134393836623436643961336531 Jul 10 00:37:46.015000 audit[2554]: AVC avc: denied { bpf } for pid=2554 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:46.015000 audit[2554]: AVC avc: denied { bpf } for pid=2554 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:46.015000 audit[2554]: AVC avc: denied { perfmon } for pid=2554 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:46.015000 audit[2554]: AVC avc: denied { perfmon } for pid=2554 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:46.015000 audit[2554]: AVC avc: denied { perfmon } for pid=2554 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:46.015000 audit[2554]: AVC avc: denied { perfmon } for pid=2554 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:46.015000 audit[2554]: AVC avc: denied { perfmon } for pid=2554 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:46.015000 audit[2554]: AVC avc: denied { bpf } for pid=2554 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:46.015000 audit[2554]: AVC avc: denied { bpf } for pid=2554 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:46.015000 audit: BPF prog-id=115 op=LOAD Jul 10 00:37:46.015000 audit[2554]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00014d770 a2=78 a3=c00028c8d8 items=0 ppid=2382 pid=2554 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:37:46.015000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3931336237386138663139656563643134393836623436643961336531 Jul 10 00:37:46.015000 audit: BPF prog-id=115 op=UNLOAD Jul 10 00:37:46.015000 audit: BPF prog-id=114 op=UNLOAD Jul 10 00:37:46.015000 audit[2554]: AVC avc: denied { bpf } for pid=2554 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:46.015000 audit[2554]: AVC avc: denied { bpf } for pid=2554 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:46.015000 audit[2554]: AVC avc: denied { bpf } for pid=2554 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:46.015000 audit[2554]: AVC avc: denied { perfmon } for pid=2554 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:46.015000 audit[2554]: AVC avc: denied { perfmon } for pid=2554 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:46.015000 audit[2554]: AVC avc: denied { perfmon } for pid=2554 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:46.015000 audit[2554]: AVC avc: denied { perfmon } for pid=2554 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:46.015000 audit[2554]: AVC avc: denied { perfmon } for pid=2554 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:46.015000 audit[2554]: AVC avc: denied { bpf } for pid=2554 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:46.015000 audit[2554]: AVC avc: denied { bpf } for pid=2554 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:46.015000 audit: BPF prog-id=116 op=LOAD Jul 10 00:37:46.015000 audit[2554]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014dc30 a2=78 a3=c00028c968 items=0 ppid=2382 pid=2554 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:37:46.015000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3931336237386138663139656563643134393836623436643961336531 Jul 10 00:37:46.027811 env[1200]: time="2025-07-10T00:37:46.027774066Z" level=info msg="StartContainer for \"913b78a8f19eecd14986b46d9a3e12826b955493d453c9b1d1cf5b800854d52b\" returns successfully" Jul 10 00:37:46.034364 env[1200]: time="2025-07-10T00:37:46.033212249Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-7fcdb87857-sr5g8,Uid:adb6abc2-1bb5-4ddf-8323-5dacb38a0c9b,Namespace:default,Attempt:1,} returns sandbox id \"79bcd3464abfb3491ed2da83b03bc1a41ae4cae0fc73c528badbd44b60484eb6\"" Jul 10 00:37:46.034527 env[1200]: time="2025-07-10T00:37:46.034470501Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" Jul 10 00:37:46.252984 kubelet[1438]: E0710 00:37:46.252852 1438 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 00:37:46.668202 kubelet[1438]: I0710 00:37:46.668094 1438 csi_plugin.go:100] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 Jul 10 00:37:46.668202 kubelet[1438]: I0710 00:37:46.668128 1438 csi_plugin.go:113] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock Jul 10 00:37:46.741070 kubelet[1438]: I0710 00:37:46.741012 1438 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/csi-node-driver-76p48" podStartSLOduration=28.949024007 podStartE2EDuration="32.740994253s" podCreationTimestamp="2025-07-10 00:37:14 +0000 UTC" firstStartedPulling="2025-07-10 00:37:42.172182547 +0000 UTC m=+29.600386749" lastFinishedPulling="2025-07-10 00:37:45.964152783 +0000 UTC m=+33.392356995" observedRunningTime="2025-07-10 00:37:46.740146014 +0000 UTC m=+34.168350227" watchObservedRunningTime="2025-07-10 00:37:46.740994253 +0000 UTC m=+34.169198455" Jul 10 00:37:47.253244 kubelet[1438]: E0710 00:37:47.253185 1438 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 00:37:47.440672 systemd-networkd[1022]: calia9976f19339: Gained IPv6LL Jul 10 00:37:48.254077 kubelet[1438]: E0710 00:37:48.253993 1438 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 00:37:48.772686 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1012339254.mount: Deactivated successfully. Jul 10 00:37:49.254488 kubelet[1438]: E0710 00:37:49.254343 1438 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 00:37:50.255339 kubelet[1438]: E0710 00:37:50.255278 1438 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 00:37:50.445291 env[1200]: time="2025-07-10T00:37:50.445251224Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 10 00:37:50.447109 env[1200]: time="2025-07-10T00:37:50.447081404Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:f6422896ca84c9af48d5417d6b7a573bf6b38f81edc15538907d987fc658d909,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 10 00:37:50.448857 env[1200]: time="2025-07-10T00:37:50.448808858Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 10 00:37:50.450485 env[1200]: time="2025-07-10T00:37:50.450454868Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx@sha256:30bb68e656e0665bce700e67d2756f68bdca3345fa1099a32bfdb8febcf621cd,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 10 00:37:50.451194 env[1200]: time="2025-07-10T00:37:50.451152725Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:f6422896ca84c9af48d5417d6b7a573bf6b38f81edc15538907d987fc658d909\"" Jul 10 00:37:50.453340 env[1200]: time="2025-07-10T00:37:50.453316389Z" level=info msg="CreateContainer within sandbox \"79bcd3464abfb3491ed2da83b03bc1a41ae4cae0fc73c528badbd44b60484eb6\" for container &ContainerMetadata{Name:nginx,Attempt:0,}" Jul 10 00:37:50.464680 env[1200]: time="2025-07-10T00:37:50.464645061Z" level=info msg="CreateContainer within sandbox \"79bcd3464abfb3491ed2da83b03bc1a41ae4cae0fc73c528badbd44b60484eb6\" for &ContainerMetadata{Name:nginx,Attempt:0,} returns container id \"dbe6e7da1c6e3dd338d7fc626afa7cc590e68dc431c43e25e22f5e5ad11ee490\"" Jul 10 00:37:50.465097 env[1200]: time="2025-07-10T00:37:50.465072935Z" level=info msg="StartContainer for \"dbe6e7da1c6e3dd338d7fc626afa7cc590e68dc431c43e25e22f5e5ad11ee490\"" Jul 10 00:37:50.480294 systemd[1]: run-containerd-runc-k8s.io-dbe6e7da1c6e3dd338d7fc626afa7cc590e68dc431c43e25e22f5e5ad11ee490-runc.A6cG1e.mount: Deactivated successfully. Jul 10 00:37:50.481616 systemd[1]: Started cri-containerd-dbe6e7da1c6e3dd338d7fc626afa7cc590e68dc431c43e25e22f5e5ad11ee490.scope. Jul 10 00:37:50.490000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:50.495442 kernel: kauditd_printk_skb: 196 callbacks suppressed Jul 10 00:37:50.495564 kernel: audit: type=1400 audit(1752107870.490:709): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:50.490000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:50.498431 kernel: audit: type=1400 audit(1752107870.490:710): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:50.490000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:50.501219 kernel: audit: type=1400 audit(1752107870.490:711): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:50.501286 kernel: audit: type=1400 audit(1752107870.490:712): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:50.490000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:50.504023 kernel: audit: type=1400 audit(1752107870.490:713): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:50.490000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:50.490000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:50.509855 kernel: audit: type=1400 audit(1752107870.490:714): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:50.509904 kernel: audit: type=1400 audit(1752107870.490:715): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:50.490000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:50.490000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:50.515666 kernel: audit: type=1400 audit(1752107870.490:716): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:50.515767 kernel: audit: type=1400 audit(1752107870.490:717): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:50.490000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:50.494000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:50.521007 kernel: audit: type=1400 audit(1752107870.494:718): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:50.494000 audit: BPF prog-id=117 op=LOAD Jul 10 00:37:50.494000 audit[2606]: AVC avc: denied { bpf } for pid=2606 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:50.494000 audit[2606]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00019fc48 a2=10 a3=1c items=0 ppid=2528 pid=2606 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:37:50.494000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6462653665376461316336653364643333386437666336323661666137 Jul 10 00:37:50.494000 audit[2606]: AVC avc: denied { perfmon } for pid=2606 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:50.494000 audit[2606]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00019f6b0 a2=3c a3=8 items=0 ppid=2528 pid=2606 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:37:50.494000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6462653665376461316336653364643333386437666336323661666137 Jul 10 00:37:50.494000 audit[2606]: AVC avc: denied { bpf } for pid=2606 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:50.494000 audit[2606]: AVC avc: denied { bpf } for pid=2606 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:50.494000 audit[2606]: AVC avc: denied { bpf } for pid=2606 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:50.494000 audit[2606]: AVC avc: denied { perfmon } for pid=2606 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:50.494000 audit[2606]: AVC avc: denied { perfmon } for pid=2606 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:50.494000 audit[2606]: AVC avc: denied { perfmon } for pid=2606 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:50.494000 audit[2606]: AVC avc: denied { perfmon } for pid=2606 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:50.494000 audit[2606]: AVC avc: denied { perfmon } for pid=2606 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:50.494000 audit[2606]: AVC avc: denied { bpf } for pid=2606 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:50.494000 audit[2606]: AVC avc: denied { bpf } for pid=2606 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:50.494000 audit: BPF prog-id=118 op=LOAD Jul 10 00:37:50.494000 audit[2606]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00019f9d8 a2=78 a3=c00008e380 items=0 ppid=2528 pid=2606 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:37:50.494000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6462653665376461316336653364643333386437666336323661666137 Jul 10 00:37:50.497000 audit[2606]: AVC avc: denied { bpf } for pid=2606 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:50.497000 audit[2606]: AVC avc: denied { bpf } for pid=2606 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:50.497000 audit[2606]: AVC avc: denied { perfmon } for pid=2606 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:50.497000 audit[2606]: AVC avc: denied { perfmon } for pid=2606 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:50.497000 audit[2606]: AVC avc: denied { perfmon } for pid=2606 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:50.497000 audit[2606]: AVC avc: denied { perfmon } for pid=2606 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:50.497000 audit[2606]: AVC avc: denied { perfmon } for pid=2606 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:50.497000 audit[2606]: AVC avc: denied { bpf } for pid=2606 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:50.497000 audit[2606]: AVC avc: denied { bpf } for pid=2606 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:50.497000 audit: BPF prog-id=119 op=LOAD Jul 10 00:37:50.497000 audit[2606]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00019f770 a2=78 a3=c00008e3c8 items=0 ppid=2528 pid=2606 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:37:50.497000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6462653665376461316336653364643333386437666336323661666137 Jul 10 00:37:50.502000 audit: BPF prog-id=119 op=UNLOAD Jul 10 00:37:50.502000 audit: BPF prog-id=118 op=UNLOAD Jul 10 00:37:50.502000 audit[2606]: AVC avc: denied { bpf } for pid=2606 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:50.502000 audit[2606]: AVC avc: denied { bpf } for pid=2606 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:50.502000 audit[2606]: AVC avc: denied { bpf } for pid=2606 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:50.502000 audit[2606]: AVC avc: denied { perfmon } for pid=2606 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:50.502000 audit[2606]: AVC avc: denied { perfmon } for pid=2606 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:50.502000 audit[2606]: AVC avc: denied { perfmon } for pid=2606 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:50.502000 audit[2606]: AVC avc: denied { perfmon } for pid=2606 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:50.502000 audit[2606]: AVC avc: denied { perfmon } for pid=2606 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:50.502000 audit[2606]: AVC avc: denied { bpf } for pid=2606 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:50.502000 audit[2606]: AVC avc: denied { bpf } for pid=2606 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:50.502000 audit: BPF prog-id=120 op=LOAD Jul 10 00:37:50.502000 audit[2606]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00019fc30 a2=78 a3=c00008e7d8 items=0 ppid=2528 pid=2606 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:37:50.502000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6462653665376461316336653364643333386437666336323661666137 Jul 10 00:37:50.531335 env[1200]: time="2025-07-10T00:37:50.531280892Z" level=info msg="StartContainer for \"dbe6e7da1c6e3dd338d7fc626afa7cc590e68dc431c43e25e22f5e5ad11ee490\" returns successfully" Jul 10 00:37:51.256382 kubelet[1438]: E0710 00:37:51.256316 1438 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 00:37:52.257351 kubelet[1438]: E0710 00:37:52.257285 1438 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 00:37:52.738000 audit[2659]: NETFILTER_CFG table=filter:89 family=2 entries=22 op=nft_register_rule pid=2659 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 10 00:37:52.738000 audit[2659]: SYSCALL arch=c000003e syscall=46 success=yes exit=12688 a0=3 a1=7ffd13555440 a2=0 a3=7ffd1355542c items=0 ppid=1656 pid=2659 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:37:52.738000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 10 00:37:52.743000 audit[2659]: NETFILTER_CFG table=nat:90 family=2 entries=24 op=nft_register_rule pid=2659 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 10 00:37:52.743000 audit[2659]: SYSCALL arch=c000003e syscall=46 success=yes exit=7308 a0=3 a1=7ffd13555440 a2=0 a3=0 items=0 ppid=1656 pid=2659 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:37:52.743000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 10 00:37:52.754000 audit[2661]: NETFILTER_CFG table=filter:91 family=2 entries=34 op=nft_register_rule pid=2661 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 10 00:37:52.754000 audit[2661]: SYSCALL arch=c000003e syscall=46 success=yes exit=12688 a0=3 a1=7ffd503f6410 a2=0 a3=7ffd503f63fc items=0 ppid=1656 pid=2661 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:37:52.754000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 10 00:37:52.762000 audit[2661]: NETFILTER_CFG table=nat:92 family=2 entries=24 op=nft_register_rule pid=2661 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 10 00:37:52.762000 audit[2661]: SYSCALL arch=c000003e syscall=46 success=yes exit=7308 a0=3 a1=7ffd503f6410 a2=0 a3=0 items=0 ppid=1656 pid=2661 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:37:52.762000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 10 00:37:52.778453 kubelet[1438]: I0710 00:37:52.778379 1438 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="default/nginx-deployment-7fcdb87857-sr5g8" podStartSLOduration=18.360153928 podStartE2EDuration="22.778361366s" podCreationTimestamp="2025-07-10 00:37:30 +0000 UTC" firstStartedPulling="2025-07-10 00:37:46.033983812 +0000 UTC m=+33.462188024" lastFinishedPulling="2025-07-10 00:37:50.45219125 +0000 UTC m=+37.880395462" observedRunningTime="2025-07-10 00:37:50.750188955 +0000 UTC m=+38.178393167" watchObservedRunningTime="2025-07-10 00:37:52.778361366 +0000 UTC m=+40.206565578" Jul 10 00:37:52.783467 systemd[1]: Created slice kubepods-besteffort-pode1dfb744_87a8_470c_9f03_87ae698985dc.slice. Jul 10 00:37:52.883539 kubelet[1438]: I0710 00:37:52.883475 1438 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"data\" (UniqueName: \"kubernetes.io/empty-dir/e1dfb744-87a8-470c-9f03-87ae698985dc-data\") pod \"nfs-server-provisioner-0\" (UID: \"e1dfb744-87a8-470c-9f03-87ae698985dc\") " pod="default/nfs-server-provisioner-0" Jul 10 00:37:52.883539 kubelet[1438]: I0710 00:37:52.883516 1438 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-ljfjp\" (UniqueName: \"kubernetes.io/projected/e1dfb744-87a8-470c-9f03-87ae698985dc-kube-api-access-ljfjp\") pod \"nfs-server-provisioner-0\" (UID: \"e1dfb744-87a8-470c-9f03-87ae698985dc\") " pod="default/nfs-server-provisioner-0" Jul 10 00:37:53.086463 env[1200]: time="2025-07-10T00:37:53.086331506Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:e1dfb744-87a8-470c-9f03-87ae698985dc,Namespace:default,Attempt:0,}" Jul 10 00:37:53.111070 update_engine[1193]: I0710 00:37:53.111001 1193 update_attempter.cc:509] Updating boot flags... Jul 10 00:37:53.232592 kubelet[1438]: E0710 00:37:53.232545 1438 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 00:37:53.235076 systemd-networkd[1022]: cali60e51b789ff: Link UP Jul 10 00:37:53.237067 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Jul 10 00:37:53.237122 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali60e51b789ff: link becomes ready Jul 10 00:37:53.237343 systemd-networkd[1022]: cali60e51b789ff: Gained carrier Jul 10 00:37:53.258374 kubelet[1438]: E0710 00:37:53.258330 1438 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 00:37:53.482655 env[1200]: 2025-07-10 00:37:53.131 [INFO][2664] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.0.0.41-k8s-nfs--server--provisioner--0-eth0 nfs-server-provisioner- default e1dfb744-87a8-470c-9f03-87ae698985dc 1271 0 2025-07-10 00:37:52 +0000 UTC map[app:nfs-server-provisioner apps.kubernetes.io/pod-index:0 chart:nfs-server-provisioner-1.8.0 controller-revision-hash:nfs-server-provisioner-d5cbb7f57 heritage:Helm projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:nfs-server-provisioner release:nfs-server-provisioner statefulset.kubernetes.io/pod-name:nfs-server-provisioner-0] map[] [] [] []} {k8s 10.0.0.41 nfs-server-provisioner-0 eth0 nfs-server-provisioner [] [] [kns.default ksa.default.nfs-server-provisioner] cali60e51b789ff [{nfs TCP 2049 0 } {nfs-udp UDP 2049 0 } {nlockmgr TCP 32803 0 } {nlockmgr-udp UDP 32803 0 } {mountd TCP 20048 0 } {mountd-udp UDP 20048 0 } {rquotad TCP 875 0 } {rquotad-udp UDP 875 0 } {rpcbind TCP 111 0 } {rpcbind-udp UDP 111 0 } {statd TCP 662 0 } {statd-udp UDP 662 0 }] [] }} ContainerID="d7198e2419500b737a00ce204eaea346b5041a7d7e1c35af54af050902b1d651" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.41-k8s-nfs--server--provisioner--0-" Jul 10 00:37:53.482655 env[1200]: 2025-07-10 00:37:53.131 [INFO][2664] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="d7198e2419500b737a00ce204eaea346b5041a7d7e1c35af54af050902b1d651" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.41-k8s-nfs--server--provisioner--0-eth0" Jul 10 00:37:53.482655 env[1200]: 2025-07-10 00:37:53.157 [INFO][2690] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="d7198e2419500b737a00ce204eaea346b5041a7d7e1c35af54af050902b1d651" HandleID="k8s-pod-network.d7198e2419500b737a00ce204eaea346b5041a7d7e1c35af54af050902b1d651" Workload="10.0.0.41-k8s-nfs--server--provisioner--0-eth0" Jul 10 00:37:53.482655 env[1200]: 2025-07-10 00:37:53.164 [INFO][2690] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="d7198e2419500b737a00ce204eaea346b5041a7d7e1c35af54af050902b1d651" HandleID="k8s-pod-network.d7198e2419500b737a00ce204eaea346b5041a7d7e1c35af54af050902b1d651" Workload="10.0.0.41-k8s-nfs--server--provisioner--0-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000123450), Attrs:map[string]string{"namespace":"default", "node":"10.0.0.41", "pod":"nfs-server-provisioner-0", "timestamp":"2025-07-10 00:37:53.157154772 +0000 UTC"}, Hostname:"10.0.0.41", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Jul 10 00:37:53.482655 env[1200]: 2025-07-10 00:37:53.164 [INFO][2690] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Jul 10 00:37:53.482655 env[1200]: 2025-07-10 00:37:53.164 [INFO][2690] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Jul 10 00:37:53.482655 env[1200]: 2025-07-10 00:37:53.164 [INFO][2690] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.0.0.41' Jul 10 00:37:53.482655 env[1200]: 2025-07-10 00:37:53.171 [INFO][2690] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.d7198e2419500b737a00ce204eaea346b5041a7d7e1c35af54af050902b1d651" host="10.0.0.41" Jul 10 00:37:53.482655 env[1200]: 2025-07-10 00:37:53.185 [INFO][2690] ipam/ipam.go 394: Looking up existing affinities for host host="10.0.0.41" Jul 10 00:37:53.482655 env[1200]: 2025-07-10 00:37:53.189 [INFO][2690] ipam/ipam.go 511: Trying affinity for 192.168.46.128/26 host="10.0.0.41" Jul 10 00:37:53.482655 env[1200]: 2025-07-10 00:37:53.191 [INFO][2690] ipam/ipam.go 158: Attempting to load block cidr=192.168.46.128/26 host="10.0.0.41" Jul 10 00:37:53.482655 env[1200]: 2025-07-10 00:37:53.193 [INFO][2690] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.46.128/26 host="10.0.0.41" Jul 10 00:37:53.482655 env[1200]: 2025-07-10 00:37:53.193 [INFO][2690] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.46.128/26 handle="k8s-pod-network.d7198e2419500b737a00ce204eaea346b5041a7d7e1c35af54af050902b1d651" host="10.0.0.41" Jul 10 00:37:53.482655 env[1200]: 2025-07-10 00:37:53.194 [INFO][2690] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.d7198e2419500b737a00ce204eaea346b5041a7d7e1c35af54af050902b1d651 Jul 10 00:37:53.482655 env[1200]: 2025-07-10 00:37:53.215 [INFO][2690] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.46.128/26 handle="k8s-pod-network.d7198e2419500b737a00ce204eaea346b5041a7d7e1c35af54af050902b1d651" host="10.0.0.41" Jul 10 00:37:53.482655 env[1200]: 2025-07-10 00:37:53.231 [INFO][2690] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.46.131/26] block=192.168.46.128/26 handle="k8s-pod-network.d7198e2419500b737a00ce204eaea346b5041a7d7e1c35af54af050902b1d651" host="10.0.0.41" Jul 10 00:37:53.482655 env[1200]: 2025-07-10 00:37:53.231 [INFO][2690] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.46.131/26] handle="k8s-pod-network.d7198e2419500b737a00ce204eaea346b5041a7d7e1c35af54af050902b1d651" host="10.0.0.41" Jul 10 00:37:53.482655 env[1200]: 2025-07-10 00:37:53.231 [INFO][2690] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Jul 10 00:37:53.482655 env[1200]: 2025-07-10 00:37:53.231 [INFO][2690] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.46.131/26] IPv6=[] ContainerID="d7198e2419500b737a00ce204eaea346b5041a7d7e1c35af54af050902b1d651" HandleID="k8s-pod-network.d7198e2419500b737a00ce204eaea346b5041a7d7e1c35af54af050902b1d651" Workload="10.0.0.41-k8s-nfs--server--provisioner--0-eth0" Jul 10 00:37:53.483328 env[1200]: 2025-07-10 00:37:53.233 [INFO][2664] cni-plugin/k8s.go 418: Populated endpoint ContainerID="d7198e2419500b737a00ce204eaea346b5041a7d7e1c35af54af050902b1d651" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.41-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.41-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"e1dfb744-87a8-470c-9f03-87ae698985dc", ResourceVersion:"1271", Generation:0, CreationTimestamp:time.Date(2025, time.July, 10, 0, 37, 52, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "apps.kubernetes.io/pod-index":"0", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.41", ContainerID:"", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.46.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Jul 10 00:37:53.483328 env[1200]: 2025-07-10 00:37:53.233 [INFO][2664] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.46.131/32] ContainerID="d7198e2419500b737a00ce204eaea346b5041a7d7e1c35af54af050902b1d651" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.41-k8s-nfs--server--provisioner--0-eth0" Jul 10 00:37:53.483328 env[1200]: 2025-07-10 00:37:53.233 [INFO][2664] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali60e51b789ff ContainerID="d7198e2419500b737a00ce204eaea346b5041a7d7e1c35af54af050902b1d651" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.41-k8s-nfs--server--provisioner--0-eth0" Jul 10 00:37:53.483328 env[1200]: 2025-07-10 00:37:53.237 [INFO][2664] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="d7198e2419500b737a00ce204eaea346b5041a7d7e1c35af54af050902b1d651" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.41-k8s-nfs--server--provisioner--0-eth0" Jul 10 00:37:53.483499 env[1200]: 2025-07-10 00:37:53.238 [INFO][2664] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="d7198e2419500b737a00ce204eaea346b5041a7d7e1c35af54af050902b1d651" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.41-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.41-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"e1dfb744-87a8-470c-9f03-87ae698985dc", ResourceVersion:"1271", Generation:0, CreationTimestamp:time.Date(2025, time.July, 10, 0, 37, 52, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "apps.kubernetes.io/pod-index":"0", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.41", ContainerID:"d7198e2419500b737a00ce204eaea346b5041a7d7e1c35af54af050902b1d651", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.46.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"4e:88:54:5a:5f:b4", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Jul 10 00:37:53.483499 env[1200]: 2025-07-10 00:37:53.481 [INFO][2664] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="d7198e2419500b737a00ce204eaea346b5041a7d7e1c35af54af050902b1d651" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.41-k8s-nfs--server--provisioner--0-eth0" Jul 10 00:37:53.492000 audit[2707]: NETFILTER_CFG table=filter:93 family=2 entries=40 op=nft_register_chain pid=2707 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 10 00:37:53.492000 audit[2707]: SYSCALL arch=c000003e syscall=46 success=yes exit=20756 a0=3 a1=7ffdd11c4d60 a2=0 a3=7ffdd11c4d4c items=0 ppid=2102 pid=2707 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:37:53.492000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 10 00:37:53.642282 env[1200]: time="2025-07-10T00:37:53.642174511Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 10 00:37:53.642282 env[1200]: time="2025-07-10T00:37:53.642229225Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 10 00:37:53.642282 env[1200]: time="2025-07-10T00:37:53.642247230Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 10 00:37:53.642560 env[1200]: time="2025-07-10T00:37:53.642448671Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/d7198e2419500b737a00ce204eaea346b5041a7d7e1c35af54af050902b1d651 pid=2717 runtime=io.containerd.runc.v2 Jul 10 00:37:53.655337 systemd[1]: Started cri-containerd-d7198e2419500b737a00ce204eaea346b5041a7d7e1c35af54af050902b1d651.scope. Jul 10 00:37:53.664000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:53.664000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:53.664000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:53.664000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:53.664000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:53.664000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:53.664000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:53.664000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:53.664000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:53.664000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:53.664000 audit: BPF prog-id=121 op=LOAD Jul 10 00:37:53.665000 audit[2727]: AVC avc: denied { bpf } for pid=2727 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:53.665000 audit[2727]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=2717 pid=2727 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:37:53.665000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6437313938653234313935303062373337613030636532303465616561 Jul 10 00:37:53.665000 audit[2727]: AVC avc: denied { perfmon } for pid=2727 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:53.665000 audit[2727]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=2717 pid=2727 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:37:53.665000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6437313938653234313935303062373337613030636532303465616561 Jul 10 00:37:53.665000 audit[2727]: AVC avc: denied { bpf } for pid=2727 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:53.665000 audit[2727]: AVC avc: denied { bpf } for pid=2727 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:53.665000 audit[2727]: AVC avc: denied { bpf } for pid=2727 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:53.665000 audit[2727]: AVC avc: denied { perfmon } for pid=2727 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:53.665000 audit[2727]: AVC avc: denied { perfmon } for pid=2727 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:53.665000 audit[2727]: AVC avc: denied { perfmon } for pid=2727 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:53.665000 audit[2727]: AVC avc: denied { perfmon } for pid=2727 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:53.665000 audit[2727]: AVC avc: denied { perfmon } for pid=2727 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:53.665000 audit[2727]: AVC avc: denied { bpf } for pid=2727 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:53.665000 audit[2727]: AVC avc: denied { bpf } for pid=2727 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:53.665000 audit: BPF prog-id=122 op=LOAD Jul 10 00:37:53.665000 audit[2727]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c000335d10 items=0 ppid=2717 pid=2727 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:37:53.665000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6437313938653234313935303062373337613030636532303465616561 Jul 10 00:37:53.665000 audit[2727]: AVC avc: denied { bpf } for pid=2727 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:53.665000 audit[2727]: AVC avc: denied { bpf } for pid=2727 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:53.665000 audit[2727]: AVC avc: denied { perfmon } for pid=2727 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:53.665000 audit[2727]: AVC avc: denied { perfmon } for pid=2727 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:53.665000 audit[2727]: AVC avc: denied { perfmon } for pid=2727 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:53.665000 audit[2727]: AVC avc: denied { perfmon } for pid=2727 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:53.665000 audit[2727]: AVC avc: denied { perfmon } for pid=2727 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:53.665000 audit[2727]: AVC avc: denied { bpf } for pid=2727 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:53.665000 audit[2727]: AVC avc: denied { bpf } for pid=2727 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:53.665000 audit: BPF prog-id=123 op=LOAD Jul 10 00:37:53.665000 audit[2727]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c000335d58 items=0 ppid=2717 pid=2727 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:37:53.665000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6437313938653234313935303062373337613030636532303465616561 Jul 10 00:37:53.665000 audit: BPF prog-id=123 op=UNLOAD Jul 10 00:37:53.665000 audit: BPF prog-id=122 op=UNLOAD Jul 10 00:37:53.665000 audit[2727]: AVC avc: denied { bpf } for pid=2727 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:53.665000 audit[2727]: AVC avc: denied { bpf } for pid=2727 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:53.665000 audit[2727]: AVC avc: denied { bpf } for pid=2727 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:53.665000 audit[2727]: AVC avc: denied { perfmon } for pid=2727 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:53.665000 audit[2727]: AVC avc: denied { perfmon } for pid=2727 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:53.665000 audit[2727]: AVC avc: denied { perfmon } for pid=2727 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:53.665000 audit[2727]: AVC avc: denied { perfmon } for pid=2727 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:53.665000 audit[2727]: AVC avc: denied { perfmon } for pid=2727 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:53.665000 audit[2727]: AVC avc: denied { bpf } for pid=2727 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:53.665000 audit[2727]: AVC avc: denied { bpf } for pid=2727 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:53.665000 audit: BPF prog-id=124 op=LOAD Jul 10 00:37:53.665000 audit[2727]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c0003b8168 items=0 ppid=2717 pid=2727 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:37:53.665000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6437313938653234313935303062373337613030636532303465616561 Jul 10 00:37:53.667013 systemd-resolved[1148]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Jul 10 00:37:53.689862 env[1200]: time="2025-07-10T00:37:53.689795926Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:e1dfb744-87a8-470c-9f03-87ae698985dc,Namespace:default,Attempt:0,} returns sandbox id \"d7198e2419500b737a00ce204eaea346b5041a7d7e1c35af54af050902b1d651\"" Jul 10 00:37:53.691705 env[1200]: time="2025-07-10T00:37:53.691668448Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\"" Jul 10 00:37:53.993496 systemd[1]: run-containerd-runc-k8s.io-d7198e2419500b737a00ce204eaea346b5041a7d7e1c35af54af050902b1d651-runc.ts3AZy.mount: Deactivated successfully. Jul 10 00:37:54.260050 kubelet[1438]: E0710 00:37:54.259495 1438 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 00:37:54.608590 systemd-networkd[1022]: cali60e51b789ff: Gained IPv6LL Jul 10 00:37:55.260455 kubelet[1438]: E0710 00:37:55.260385 1438 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 00:37:56.047529 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3763595959.mount: Deactivated successfully. Jul 10 00:37:56.260621 kubelet[1438]: E0710 00:37:56.260540 1438 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 00:37:57.261014 kubelet[1438]: E0710 00:37:57.260938 1438 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 00:37:58.261492 kubelet[1438]: E0710 00:37:58.261436 1438 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 00:37:58.346533 env[1200]: time="2025-07-10T00:37:58.346483257Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 10 00:37:58.348441 env[1200]: time="2025-07-10T00:37:58.348421173Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:fd0b16f70b66b72bcb2f91d556fa33eba02729c44ffc5f2c16130e7f9fbed3c4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 10 00:37:58.350017 env[1200]: time="2025-07-10T00:37:58.349989798Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 10 00:37:58.351473 env[1200]: time="2025-07-10T00:37:58.351450731Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 10 00:37:58.352095 env[1200]: time="2025-07-10T00:37:58.352044453Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\" returns image reference \"sha256:fd0b16f70b66b72bcb2f91d556fa33eba02729c44ffc5f2c16130e7f9fbed3c4\"" Jul 10 00:37:58.354159 env[1200]: time="2025-07-10T00:37:58.354132903Z" level=info msg="CreateContainer within sandbox \"d7198e2419500b737a00ce204eaea346b5041a7d7e1c35af54af050902b1d651\" for container &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,}" Jul 10 00:37:58.366166 env[1200]: time="2025-07-10T00:37:58.366126553Z" level=info msg="CreateContainer within sandbox \"d7198e2419500b737a00ce204eaea346b5041a7d7e1c35af54af050902b1d651\" for &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,} returns container id \"c03eb527858d098050a99a85c9fd600470b41c8f22991f45dd0d4bc6a286783a\"" Jul 10 00:37:58.366613 env[1200]: time="2025-07-10T00:37:58.366577526Z" level=info msg="StartContainer for \"c03eb527858d098050a99a85c9fd600470b41c8f22991f45dd0d4bc6a286783a\"" Jul 10 00:37:58.384699 systemd[1]: Started cri-containerd-c03eb527858d098050a99a85c9fd600470b41c8f22991f45dd0d4bc6a286783a.scope. Jul 10 00:37:58.401460 kernel: kauditd_printk_skb: 119 callbacks suppressed Jul 10 00:37:58.401626 kernel: audit: type=1400 audit(1752107878.392:750): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:58.401653 kernel: audit: type=1400 audit(1752107878.392:751): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:58.401679 kernel: audit: type=1400 audit(1752107878.392:752): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:58.392000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:58.392000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:58.392000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:58.392000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:58.405588 kernel: audit: type=1400 audit(1752107878.392:753): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:58.405664 kernel: audit: type=1400 audit(1752107878.392:754): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:58.392000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:58.408336 kernel: audit: type=1400 audit(1752107878.392:755): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:58.392000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:58.413906 kernel: audit: type=1400 audit(1752107878.392:756): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:58.392000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:58.417022 kernel: audit: type=1400 audit(1752107878.392:757): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:58.392000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:58.392000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:58.420162 kernel: audit: type=1400 audit(1752107878.392:758): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:58.420242 kernel: audit: type=1400 audit(1752107878.393:759): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:58.393000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:58.393000 audit: BPF prog-id=125 op=LOAD Jul 10 00:37:58.393000 audit[2765]: AVC avc: denied { bpf } for pid=2765 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:58.393000 audit[2765]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2717 pid=2765 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:37:58.393000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6330336562353237383538643039383035306139396138356339666436 Jul 10 00:37:58.393000 audit[2765]: AVC avc: denied { perfmon } for pid=2765 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:58.393000 audit[2765]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=2717 pid=2765 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:37:58.393000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6330336562353237383538643039383035306139396138356339666436 Jul 10 00:37:58.393000 audit[2765]: AVC avc: denied { bpf } for pid=2765 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:58.393000 audit[2765]: AVC avc: denied { bpf } for pid=2765 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:58.393000 audit[2765]: AVC avc: denied { bpf } for pid=2765 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:58.393000 audit[2765]: AVC avc: denied { perfmon } for pid=2765 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:58.393000 audit[2765]: AVC avc: denied { perfmon } for pid=2765 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:58.393000 audit[2765]: AVC avc: denied { perfmon } for pid=2765 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:58.393000 audit[2765]: AVC avc: denied { perfmon } for pid=2765 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:58.393000 audit[2765]: AVC avc: denied { perfmon } for pid=2765 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:58.393000 audit[2765]: AVC avc: denied { bpf } for pid=2765 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:58.393000 audit[2765]: AVC avc: denied { bpf } for pid=2765 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:58.393000 audit: BPF prog-id=126 op=LOAD Jul 10 00:37:58.393000 audit[2765]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c00034a320 items=0 ppid=2717 pid=2765 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:37:58.393000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6330336562353237383538643039383035306139396138356339666436 Jul 10 00:37:58.396000 audit[2765]: AVC avc: denied { bpf } for pid=2765 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:58.396000 audit[2765]: AVC avc: denied { bpf } for pid=2765 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:58.396000 audit[2765]: AVC avc: denied { perfmon } for pid=2765 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:58.396000 audit[2765]: AVC avc: denied { perfmon } for pid=2765 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:58.396000 audit[2765]: AVC avc: denied { perfmon } for pid=2765 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:58.396000 audit[2765]: AVC avc: denied { perfmon } for pid=2765 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:58.396000 audit[2765]: AVC avc: denied { perfmon } for pid=2765 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:58.396000 audit[2765]: AVC avc: denied { bpf } for pid=2765 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:58.396000 audit[2765]: AVC avc: denied { bpf } for pid=2765 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:58.396000 audit: BPF prog-id=127 op=LOAD Jul 10 00:37:58.396000 audit[2765]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c00034a368 items=0 ppid=2717 pid=2765 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:37:58.396000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6330336562353237383538643039383035306139396138356339666436 Jul 10 00:37:58.402000 audit: BPF prog-id=127 op=UNLOAD Jul 10 00:37:58.402000 audit: BPF prog-id=126 op=UNLOAD Jul 10 00:37:58.402000 audit[2765]: AVC avc: denied { bpf } for pid=2765 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:58.402000 audit[2765]: AVC avc: denied { bpf } for pid=2765 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:58.402000 audit[2765]: AVC avc: denied { bpf } for pid=2765 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:58.402000 audit[2765]: AVC avc: denied { perfmon } for pid=2765 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:58.402000 audit[2765]: AVC avc: denied { perfmon } for pid=2765 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:58.402000 audit[2765]: AVC avc: denied { perfmon } for pid=2765 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:58.402000 audit[2765]: AVC avc: denied { perfmon } for pid=2765 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:58.402000 audit[2765]: AVC avc: denied { perfmon } for pid=2765 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:58.402000 audit[2765]: AVC avc: denied { bpf } for pid=2765 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:58.402000 audit[2765]: AVC avc: denied { bpf } for pid=2765 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:37:58.402000 audit: BPF prog-id=128 op=LOAD Jul 10 00:37:58.402000 audit[2765]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c00034a778 items=0 ppid=2717 pid=2765 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:37:58.402000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6330336562353237383538643039383035306139396138356339666436 Jul 10 00:37:58.431891 env[1200]: time="2025-07-10T00:37:58.431833504Z" level=info msg="StartContainer for \"c03eb527858d098050a99a85c9fd600470b41c8f22991f45dd0d4bc6a286783a\" returns successfully" Jul 10 00:37:58.468000 audit[2795]: AVC avc: denied { search } for pid=2795 comm="rpcbind" name="crypto" dev="proc" ino=21277 scontext=system_u:system_r:svirt_lxc_net_t:s0:c88,c846 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Jul 10 00:37:58.468000 audit[2795]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7f19fc0410c0 a2=0 a3=0 items=0 ppid=2776 pid=2795 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="rpcbind" exe="/usr/bin/rpcbind" subj=system_u:system_r:svirt_lxc_net_t:s0:c88,c846 key=(null) Jul 10 00:37:58.468000 audit: PROCTITLE proctitle=2F7573722F7362696E2F72706362696E64002D77 Jul 10 00:37:58.499000 audit[2800]: AVC avc: denied { search } for pid=2800 comm="dbus-daemon" name="crypto" dev="proc" ino=21277 scontext=system_u:system_r:svirt_lxc_net_t:s0:c88,c846 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Jul 10 00:37:58.499000 audit[2800]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7ff7617750c0 a2=0 a3=0 items=0 ppid=2776 pid=2800 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c88,c846 key=(null) Jul 10 00:37:58.499000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65 Jul 10 00:37:58.502000 audit[2803]: AVC avc: denied { watch } for pid=2803 comm="dbus-daemon" path="/usr/share/dbus-1/system.d" dev="overlay" ino=537649 scontext=system_u:system_r:svirt_lxc_net_t:s0:c88,c846 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c88,c846 tclass=dir permissive=0 Jul 10 00:37:58.502000 audit[2803]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6 a1=55adbe90cb30 a2=2c8 a3=7ffed820a57c items=0 ppid=2776 pid=2803 auid=4294967295 uid=81 gid=81 euid=81 suid=81 fsuid=81 egid=81 sgid=81 fsgid=81 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c88,c846 key=(null) Jul 10 00:37:58.502000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65 Jul 10 00:37:58.506000 audit[2804]: AVC avc: denied { read } for pid=2804 comm="ganesha.nfsd" name="overcommit_memory" dev="proc" ino=24500 scontext=system_u:system_r:svirt_lxc_net_t:s0:c88,c846 tcontext=system_u:object_r:sysctl_vm_overcommit_t:s0 tclass=file permissive=0 Jul 10 00:37:58.506000 audit[2804]: SYSCALL arch=c000003e syscall=2 success=no exit=-13 a0=7f19cd9be320 a1=80000 a2=d a3=7ffda2060900 items=0 ppid=2776 pid=2804 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c88,c846 key=(null) Jul 10 00:37:58.506000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66 Jul 10 00:37:58.507000 audit[2804]: AVC avc: denied { search } for pid=2804 comm="ganesha.nfsd" name="crypto" dev="proc" ino=21277 scontext=system_u:system_r:svirt_lxc_net_t:s0:c88,c846 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Jul 10 00:37:58.507000 audit[2804]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7f19ccf120c0 a2=0 a3=0 items=0 ppid=2776 pid=2804 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c88,c846 key=(null) Jul 10 00:37:58.507000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66 Jul 10 00:37:58.764798 kubelet[1438]: I0710 00:37:58.764749 1438 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="default/nfs-server-provisioner-0" podStartSLOduration=2.102782904 podStartE2EDuration="6.764730576s" podCreationTimestamp="2025-07-10 00:37:52 +0000 UTC" firstStartedPulling="2025-07-10 00:37:53.691024276 +0000 UTC m=+41.119228488" lastFinishedPulling="2025-07-10 00:37:58.352971948 +0000 UTC m=+45.781176160" observedRunningTime="2025-07-10 00:37:58.764562518 +0000 UTC m=+46.192766730" watchObservedRunningTime="2025-07-10 00:37:58.764730576 +0000 UTC m=+46.192934788" Jul 10 00:37:58.774000 audit[2822]: NETFILTER_CFG table=filter:94 family=2 entries=22 op=nft_register_rule pid=2822 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 10 00:37:58.774000 audit[2822]: SYSCALL arch=c000003e syscall=46 success=yes exit=3760 a0=3 a1=7ffe5cc27b80 a2=0 a3=7ffe5cc27b6c items=0 ppid=1656 pid=2822 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:37:58.774000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 10 00:37:58.780000 audit[2822]: NETFILTER_CFG table=nat:95 family=2 entries=108 op=nft_register_chain pid=2822 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 10 00:37:58.780000 audit[2822]: SYSCALL arch=c000003e syscall=46 success=yes exit=50220 a0=3 a1=7ffe5cc27b80 a2=0 a3=7ffe5cc27b6c items=0 ppid=1656 pid=2822 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:37:58.780000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 10 00:37:59.262580 kubelet[1438]: E0710 00:37:59.262506 1438 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 00:38:00.263210 kubelet[1438]: E0710 00:38:00.263160 1438 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 00:38:01.263965 kubelet[1438]: E0710 00:38:01.263876 1438 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 00:38:01.959000 audit[2825]: NETFILTER_CFG table=filter:96 family=2 entries=10 op=nft_register_rule pid=2825 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 10 00:38:01.959000 audit[2825]: SYSCALL arch=c000003e syscall=46 success=yes exit=3760 a0=3 a1=7ffe95eb5f30 a2=0 a3=7ffe95eb5f1c items=0 ppid=1656 pid=2825 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:38:01.959000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 10 00:38:01.968000 audit[2825]: NETFILTER_CFG table=nat:97 family=2 entries=60 op=nft_register_chain pid=2825 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 10 00:38:01.968000 audit[2825]: SYSCALL arch=c000003e syscall=46 success=yes exit=21220 a0=3 a1=7ffe95eb5f30 a2=0 a3=7ffe95eb5f1c items=0 ppid=1656 pid=2825 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:38:01.968000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 10 00:38:02.264548 kubelet[1438]: E0710 00:38:02.264441 1438 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 00:38:03.265060 kubelet[1438]: E0710 00:38:03.265001 1438 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 00:38:04.265851 kubelet[1438]: E0710 00:38:04.265792 1438 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 00:38:05.266542 kubelet[1438]: E0710 00:38:05.266472 1438 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 00:38:06.267481 kubelet[1438]: E0710 00:38:06.267435 1438 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 00:38:07.268332 kubelet[1438]: E0710 00:38:07.268276 1438 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 00:38:08.268742 kubelet[1438]: E0710 00:38:08.268665 1438 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 00:38:08.563817 systemd[1]: Created slice kubepods-besteffort-pod36aac103_c1b7_4ee0_945d_35c9673eab44.slice. Jul 10 00:38:08.668529 kubelet[1438]: I0710 00:38:08.668479 1438 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-z8wwc\" (UniqueName: \"kubernetes.io/projected/36aac103-c1b7-4ee0-945d-35c9673eab44-kube-api-access-z8wwc\") pod \"test-pod-1\" (UID: \"36aac103-c1b7-4ee0-945d-35c9673eab44\") " pod="default/test-pod-1" Jul 10 00:38:08.668529 kubelet[1438]: I0710 00:38:08.668527 1438 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"pvc-5ef5c6de-cda4-4c36-a72b-cbd57d0ab8ec\" (UniqueName: \"kubernetes.io/nfs/36aac103-c1b7-4ee0-945d-35c9673eab44-pvc-5ef5c6de-cda4-4c36-a72b-cbd57d0ab8ec\") pod \"test-pod-1\" (UID: \"36aac103-c1b7-4ee0-945d-35c9673eab44\") " pod="default/test-pod-1" Jul 10 00:38:08.780000 audit[2855]: AVC avc: denied { confidentiality } for pid=2855 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:38:08.783499 kernel: Failed to create system directory netfs Jul 10 00:38:08.783636 kernel: kauditd_printk_skb: 74 callbacks suppressed Jul 10 00:38:08.783656 kernel: audit: type=1400 audit(1752107888.780:777): avc: denied { confidentiality } for pid=2855 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:38:08.783680 kernel: Failed to create system directory netfs Jul 10 00:38:08.783695 kernel: audit: type=1400 audit(1752107888.780:777): avc: denied { confidentiality } for pid=2855 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:38:08.780000 audit[2855]: AVC avc: denied { confidentiality } for pid=2855 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:38:08.780000 audit[2855]: AVC avc: denied { confidentiality } for pid=2855 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:38:08.790981 kernel: Failed to create system directory netfs Jul 10 00:38:08.791058 kernel: audit: type=1400 audit(1752107888.780:777): avc: denied { confidentiality } for pid=2855 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:38:08.791088 kernel: Failed to create system directory netfs Jul 10 00:38:08.794064 kernel: audit: type=1400 audit(1752107888.780:777): avc: denied { confidentiality } for pid=2855 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:38:08.780000 audit[2855]: AVC avc: denied { confidentiality } for pid=2855 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:38:08.780000 audit[2855]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=561f06f545e0 a1=153bc a2=561ee09fc2b0 a3=5 items=0 ppid=71 pid=2855 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:38:08.780000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Jul 10 00:38:08.804491 kernel: audit: type=1300 audit(1752107888.780:777): arch=c000003e syscall=175 success=yes exit=0 a0=561f06f545e0 a1=153bc a2=561ee09fc2b0 a3=5 items=0 ppid=71 pid=2855 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:38:08.804581 kernel: audit: type=1327 audit(1752107888.780:777): proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Jul 10 00:38:08.803000 audit[2855]: AVC avc: denied { confidentiality } for pid=2855 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:38:08.811003 kernel: Failed to create system directory fscache Jul 10 00:38:08.811063 kernel: audit: type=1400 audit(1752107888.803:778): avc: denied { confidentiality } for pid=2855 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:38:08.811093 kernel: Failed to create system directory fscache Jul 10 00:38:08.811119 kernel: audit: type=1400 audit(1752107888.803:778): avc: denied { confidentiality } for pid=2855 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:38:08.803000 audit[2855]: AVC avc: denied { confidentiality } for pid=2855 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:38:08.803000 audit[2855]: AVC avc: denied { confidentiality } for pid=2855 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:38:08.815782 kernel: Failed to create system directory fscache Jul 10 00:38:08.815826 kernel: audit: type=1400 audit(1752107888.803:778): avc: denied { confidentiality } for pid=2855 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:38:08.815855 kernel: Failed to create system directory fscache Jul 10 00:38:08.815886 kernel: Failed to create system directory fscache Jul 10 00:38:08.815914 kernel: Failed to create system directory fscache Jul 10 00:38:08.815944 kernel: Failed to create system directory fscache Jul 10 00:38:08.815970 kernel: Failed to create system directory fscache Jul 10 00:38:08.815986 kernel: Failed to create system directory fscache Jul 10 00:38:08.816006 kernel: Failed to create system directory fscache Jul 10 00:38:08.816022 kernel: Failed to create system directory fscache Jul 10 00:38:08.816036 kernel: Failed to create system directory fscache Jul 10 00:38:08.816052 kernel: Failed to create system directory fscache Jul 10 00:38:08.816070 kernel: Failed to create system directory fscache Jul 10 00:38:08.803000 audit[2855]: AVC avc: denied { confidentiality } for pid=2855 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:38:08.829891 kernel: audit: type=1400 audit(1752107888.803:778): avc: denied { confidentiality } for pid=2855 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:38:08.803000 audit[2855]: AVC avc: denied { confidentiality } for pid=2855 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:38:08.803000 audit[2855]: AVC avc: denied { confidentiality } for pid=2855 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:38:08.803000 audit[2855]: AVC avc: denied { confidentiality } for pid=2855 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:38:08.803000 audit[2855]: AVC avc: denied { confidentiality } for pid=2855 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:38:08.803000 audit[2855]: AVC avc: denied { confidentiality } for pid=2855 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:38:08.803000 audit[2855]: AVC avc: denied { confidentiality } for pid=2855 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:38:08.803000 audit[2855]: AVC avc: denied { confidentiality } for pid=2855 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:38:08.803000 audit[2855]: AVC avc: denied { confidentiality } for pid=2855 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:38:08.803000 audit[2855]: AVC avc: denied { confidentiality } for pid=2855 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:38:08.803000 audit[2855]: AVC avc: denied { confidentiality } for pid=2855 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:38:08.803000 audit[2855]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=561f071699c0 a1=4c0fc a2=561ee09fc2b0 a3=5 items=0 ppid=71 pid=2855 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:38:08.803000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Jul 10 00:38:08.832438 kernel: FS-Cache: Loaded Jul 10 00:38:08.851000 audit[2855]: AVC avc: denied { confidentiality } for pid=2855 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:38:08.851000 audit[2855]: AVC avc: denied { confidentiality } for pid=2855 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:38:08.862074 kernel: Failed to create system directory sunrpc Jul 10 00:38:08.862142 kernel: Failed to create system directory sunrpc Jul 10 00:38:08.862161 kernel: Failed to create system directory sunrpc Jul 10 00:38:08.851000 audit[2855]: AVC avc: denied { confidentiality } for pid=2855 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:38:08.851000 audit[2855]: AVC avc: denied { confidentiality } for pid=2855 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:38:08.863502 kernel: Failed to create system directory sunrpc Jul 10 00:38:08.863535 kernel: Failed to create system directory sunrpc Jul 10 00:38:08.851000 audit[2855]: AVC avc: denied { confidentiality } for pid=2855 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:38:08.851000 audit[2855]: AVC avc: denied { confidentiality } for pid=2855 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:38:08.851000 audit[2855]: AVC avc: denied { confidentiality } for pid=2855 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:38:08.867107 kernel: Failed to create system directory sunrpc Jul 10 00:38:08.867184 kernel: Failed to create system directory sunrpc Jul 10 00:38:08.867269 kernel: Failed to create system directory sunrpc Jul 10 00:38:08.851000 audit[2855]: AVC avc: denied { confidentiality } for pid=2855 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:38:08.851000 audit[2855]: AVC avc: denied { confidentiality } for pid=2855 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:38:08.868506 kernel: Failed to create system directory sunrpc Jul 10 00:38:08.868532 kernel: Failed to create system directory sunrpc Jul 10 00:38:08.851000 audit[2855]: AVC avc: denied { confidentiality } for pid=2855 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:38:08.851000 audit[2855]: AVC avc: denied { confidentiality } for pid=2855 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:38:08.869906 kernel: Failed to create system directory sunrpc Jul 10 00:38:08.869955 kernel: Failed to create system directory sunrpc Jul 10 00:38:08.851000 audit[2855]: AVC avc: denied { confidentiality } for pid=2855 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:38:08.851000 audit[2855]: AVC avc: denied { confidentiality } for pid=2855 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:38:08.851000 audit[2855]: AVC avc: denied { confidentiality } for pid=2855 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:38:08.871990 kernel: Failed to create system directory sunrpc Jul 10 00:38:08.872020 kernel: Failed to create system directory sunrpc Jul 10 00:38:08.872037 kernel: Failed to create system directory sunrpc Jul 10 00:38:08.851000 audit[2855]: AVC avc: denied { confidentiality } for pid=2855 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:38:08.851000 audit[2855]: AVC avc: denied { confidentiality } for pid=2855 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:38:08.851000 audit[2855]: AVC avc: denied { confidentiality } for pid=2855 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:38:08.874102 kernel: Failed to create system directory sunrpc Jul 10 00:38:08.874124 kernel: Failed to create system directory sunrpc Jul 10 00:38:08.874144 kernel: Failed to create system directory sunrpc Jul 10 00:38:08.851000 audit[2855]: AVC avc: denied { confidentiality } for pid=2855 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:38:08.851000 audit[2855]: AVC avc: denied { confidentiality } for pid=2855 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:38:08.875658 kernel: Failed to create system directory sunrpc Jul 10 00:38:08.875681 kernel: Failed to create system directory sunrpc Jul 10 00:38:08.851000 audit[2855]: AVC avc: denied { confidentiality } for pid=2855 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:38:08.876521 kernel: Failed to create system directory sunrpc Jul 10 00:38:08.851000 audit[2855]: AVC avc: denied { confidentiality } for pid=2855 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:38:08.851000 audit[2855]: AVC avc: denied { confidentiality } for pid=2855 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:38:08.877957 kernel: Failed to create system directory sunrpc Jul 10 00:38:08.877993 kernel: Failed to create system directory sunrpc Jul 10 00:38:08.851000 audit[2855]: AVC avc: denied { confidentiality } for pid=2855 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:38:08.851000 audit[2855]: AVC avc: denied { confidentiality } for pid=2855 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:38:08.851000 audit[2855]: AVC avc: denied { confidentiality } for pid=2855 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:38:08.880028 kernel: Failed to create system directory sunrpc Jul 10 00:38:08.880052 kernel: Failed to create system directory sunrpc Jul 10 00:38:08.880073 kernel: Failed to create system directory sunrpc Jul 10 00:38:08.851000 audit[2855]: AVC avc: denied { confidentiality } for pid=2855 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:38:08.851000 audit[2855]: AVC avc: denied { confidentiality } for pid=2855 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:38:08.881434 kernel: Failed to create system directory sunrpc Jul 10 00:38:08.881462 kernel: Failed to create system directory sunrpc Jul 10 00:38:08.851000 audit[2855]: AVC avc: denied { confidentiality } for pid=2855 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:38:08.851000 audit[2855]: AVC avc: denied { confidentiality } for pid=2855 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:38:08.882826 kernel: Failed to create system directory sunrpc Jul 10 00:38:08.882850 kernel: Failed to create system directory sunrpc Jul 10 00:38:08.851000 audit[2855]: AVC avc: denied { confidentiality } for pid=2855 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:38:08.851000 audit[2855]: AVC avc: denied { confidentiality } for pid=2855 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:38:08.851000 audit[2855]: AVC avc: denied { confidentiality } for pid=2855 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:38:08.884926 kernel: Failed to create system directory sunrpc Jul 10 00:38:08.884952 kernel: Failed to create system directory sunrpc Jul 10 00:38:08.884968 kernel: Failed to create system directory sunrpc Jul 10 00:38:08.851000 audit[2855]: AVC avc: denied { confidentiality } for pid=2855 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:38:08.851000 audit[2855]: AVC avc: denied { confidentiality } for pid=2855 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:38:08.851000 audit[2855]: AVC avc: denied { confidentiality } for pid=2855 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:38:08.887027 kernel: Failed to create system directory sunrpc Jul 10 00:38:08.887061 kernel: Failed to create system directory sunrpc Jul 10 00:38:08.887076 kernel: Failed to create system directory sunrpc Jul 10 00:38:08.851000 audit[2855]: AVC avc: denied { confidentiality } for pid=2855 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:38:08.851000 audit[2855]: AVC avc: denied { confidentiality } for pid=2855 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:38:08.888444 kernel: Failed to create system directory sunrpc Jul 10 00:38:08.888471 kernel: Failed to create system directory sunrpc Jul 10 00:38:08.851000 audit[2855]: AVC avc: denied { confidentiality } for pid=2855 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:38:08.851000 audit[2855]: AVC avc: denied { confidentiality } for pid=2855 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:38:08.889856 kernel: Failed to create system directory sunrpc Jul 10 00:38:08.889927 kernel: Failed to create system directory sunrpc Jul 10 00:38:08.851000 audit[2855]: AVC avc: denied { confidentiality } for pid=2855 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:38:08.851000 audit[2855]: AVC avc: denied { confidentiality } for pid=2855 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:38:08.851000 audit[2855]: AVC avc: denied { confidentiality } for pid=2855 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:38:08.891944 kernel: Failed to create system directory sunrpc Jul 10 00:38:08.891984 kernel: Failed to create system directory sunrpc Jul 10 00:38:08.892006 kernel: Failed to create system directory sunrpc Jul 10 00:38:08.851000 audit[2855]: AVC avc: denied { confidentiality } for pid=2855 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:38:08.851000 audit[2855]: AVC avc: denied { confidentiality } for pid=2855 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:38:08.851000 audit[2855]: AVC avc: denied { confidentiality } for pid=2855 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:38:08.894070 kernel: Failed to create system directory sunrpc Jul 10 00:38:08.894119 kernel: Failed to create system directory sunrpc Jul 10 00:38:08.894141 kernel: Failed to create system directory sunrpc Jul 10 00:38:08.851000 audit[2855]: AVC avc: denied { confidentiality } for pid=2855 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:38:08.851000 audit[2855]: AVC avc: denied { confidentiality } for pid=2855 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:38:08.895535 kernel: Failed to create system directory sunrpc Jul 10 00:38:08.895595 kernel: Failed to create system directory sunrpc Jul 10 00:38:08.851000 audit[2855]: AVC avc: denied { confidentiality } for pid=2855 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:38:08.851000 audit[2855]: AVC avc: denied { confidentiality } for pid=2855 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:38:08.896917 kernel: Failed to create system directory sunrpc Jul 10 00:38:08.896936 kernel: Failed to create system directory sunrpc Jul 10 00:38:08.851000 audit[2855]: AVC avc: denied { confidentiality } for pid=2855 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:38:08.851000 audit[2855]: AVC avc: denied { confidentiality } for pid=2855 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:38:08.851000 audit[2855]: AVC avc: denied { confidentiality } for pid=2855 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:38:08.899076 kernel: Failed to create system directory sunrpc Jul 10 00:38:08.899107 kernel: Failed to create system directory sunrpc Jul 10 00:38:08.899123 kernel: Failed to create system directory sunrpc Jul 10 00:38:08.851000 audit[2855]: AVC avc: denied { confidentiality } for pid=2855 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:38:08.851000 audit[2855]: AVC avc: denied { confidentiality } for pid=2855 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:38:08.900469 kernel: Failed to create system directory sunrpc Jul 10 00:38:08.900489 kernel: Failed to create system directory sunrpc Jul 10 00:38:08.851000 audit[2855]: AVC avc: denied { confidentiality } for pid=2855 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:38:08.851000 audit[2855]: AVC avc: denied { confidentiality } for pid=2855 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:38:08.901891 kernel: Failed to create system directory sunrpc Jul 10 00:38:08.901918 kernel: Failed to create system directory sunrpc Jul 10 00:38:08.851000 audit[2855]: AVC avc: denied { confidentiality } for pid=2855 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:38:08.851000 audit[2855]: AVC avc: denied { confidentiality } for pid=2855 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:38:08.851000 audit[2855]: AVC avc: denied { confidentiality } for pid=2855 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:38:08.904043 kernel: Failed to create system directory sunrpc Jul 10 00:38:08.904079 kernel: Failed to create system directory sunrpc Jul 10 00:38:08.904095 kernel: Failed to create system directory sunrpc Jul 10 00:38:08.851000 audit[2855]: AVC avc: denied { confidentiality } for pid=2855 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:38:08.851000 audit[2855]: AVC avc: denied { confidentiality } for pid=2855 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:38:08.905422 kernel: Failed to create system directory sunrpc Jul 10 00:38:08.905448 kernel: Failed to create system directory sunrpc Jul 10 00:38:08.851000 audit[2855]: AVC avc: denied { confidentiality } for pid=2855 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:38:08.851000 audit[2855]: AVC avc: denied { confidentiality } for pid=2855 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:38:08.906796 kernel: Failed to create system directory sunrpc Jul 10 00:38:08.906825 kernel: Failed to create system directory sunrpc Jul 10 00:38:08.851000 audit[2855]: AVC avc: denied { confidentiality } for pid=2855 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:38:08.851000 audit[2855]: AVC avc: denied { confidentiality } for pid=2855 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:38:08.851000 audit[2855]: AVC avc: denied { confidentiality } for pid=2855 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:38:08.908894 kernel: Failed to create system directory sunrpc Jul 10 00:38:08.908935 kernel: Failed to create system directory sunrpc Jul 10 00:38:08.908952 kernel: Failed to create system directory sunrpc Jul 10 00:38:08.851000 audit[2855]: AVC avc: denied { confidentiality } for pid=2855 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:38:08.851000 audit[2855]: AVC avc: denied { confidentiality } for pid=2855 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:38:08.851000 audit[2855]: AVC avc: denied { confidentiality } for pid=2855 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:38:08.910981 kernel: Failed to create system directory sunrpc Jul 10 00:38:08.911007 kernel: Failed to create system directory sunrpc Jul 10 00:38:08.911028 kernel: Failed to create system directory sunrpc Jul 10 00:38:08.851000 audit[2855]: AVC avc: denied { confidentiality } for pid=2855 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:38:08.851000 audit[2855]: AVC avc: denied { confidentiality } for pid=2855 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:38:08.912426 kernel: Failed to create system directory sunrpc Jul 10 00:38:08.912461 kernel: Failed to create system directory sunrpc Jul 10 00:38:08.851000 audit[2855]: AVC avc: denied { confidentiality } for pid=2855 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:38:08.851000 audit[2855]: AVC avc: denied { confidentiality } for pid=2855 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:38:08.913839 kernel: Failed to create system directory sunrpc Jul 10 00:38:08.913864 kernel: Failed to create system directory sunrpc Jul 10 00:38:08.851000 audit[2855]: AVC avc: denied { confidentiality } for pid=2855 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:38:08.851000 audit[2855]: AVC avc: denied { confidentiality } for pid=2855 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:38:08.851000 audit[2855]: AVC avc: denied { confidentiality } for pid=2855 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:38:08.915907 kernel: Failed to create system directory sunrpc Jul 10 00:38:08.915933 kernel: Failed to create system directory sunrpc Jul 10 00:38:08.915948 kernel: Failed to create system directory sunrpc Jul 10 00:38:08.851000 audit[2855]: AVC avc: denied { confidentiality } for pid=2855 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:38:08.851000 audit[2855]: AVC avc: denied { confidentiality } for pid=2855 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:38:08.851000 audit[2855]: AVC avc: denied { confidentiality } for pid=2855 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:38:08.917981 kernel: Failed to create system directory sunrpc Jul 10 00:38:08.918013 kernel: Failed to create system directory sunrpc Jul 10 00:38:08.918030 kernel: Failed to create system directory sunrpc Jul 10 00:38:08.851000 audit[2855]: AVC avc: denied { confidentiality } for pid=2855 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:38:08.851000 audit[2855]: AVC avc: denied { confidentiality } for pid=2855 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:38:08.851000 audit[2855]: AVC avc: denied { confidentiality } for pid=2855 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:38:08.920064 kernel: Failed to create system directory sunrpc Jul 10 00:38:08.920086 kernel: Failed to create system directory sunrpc Jul 10 00:38:08.920101 kernel: Failed to create system directory sunrpc Jul 10 00:38:08.851000 audit[2855]: AVC avc: denied { confidentiality } for pid=2855 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:38:08.851000 audit[2855]: AVC avc: denied { confidentiality } for pid=2855 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:38:08.921458 kernel: Failed to create system directory sunrpc Jul 10 00:38:08.921486 kernel: Failed to create system directory sunrpc Jul 10 00:38:08.851000 audit[2855]: AVC avc: denied { confidentiality } for pid=2855 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:38:08.851000 audit[2855]: AVC avc: denied { confidentiality } for pid=2855 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:38:08.922846 kernel: Failed to create system directory sunrpc Jul 10 00:38:08.922957 kernel: Failed to create system directory sunrpc Jul 10 00:38:08.851000 audit[2855]: AVC avc: denied { confidentiality } for pid=2855 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:38:08.851000 audit[2855]: AVC avc: denied { confidentiality } for pid=2855 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:38:08.851000 audit[2855]: AVC avc: denied { confidentiality } for pid=2855 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:38:08.924946 kernel: Failed to create system directory sunrpc Jul 10 00:38:08.924965 kernel: Failed to create system directory sunrpc Jul 10 00:38:08.924986 kernel: Failed to create system directory sunrpc Jul 10 00:38:08.851000 audit[2855]: AVC avc: denied { confidentiality } for pid=2855 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:38:08.851000 audit[2855]: AVC avc: denied { confidentiality } for pid=2855 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:38:08.851000 audit[2855]: AVC avc: denied { confidentiality } for pid=2855 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:38:08.927047 kernel: Failed to create system directory sunrpc Jul 10 00:38:08.927091 kernel: Failed to create system directory sunrpc Jul 10 00:38:08.927106 kernel: Failed to create system directory sunrpc Jul 10 00:38:08.851000 audit[2855]: AVC avc: denied { confidentiality } for pid=2855 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:38:08.851000 audit[2855]: AVC avc: denied { confidentiality } for pid=2855 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:38:08.928424 kernel: Failed to create system directory sunrpc Jul 10 00:38:08.928453 kernel: Failed to create system directory sunrpc Jul 10 00:38:08.851000 audit[2855]: AVC avc: denied { confidentiality } for pid=2855 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:38:08.851000 audit[2855]: AVC avc: denied { confidentiality } for pid=2855 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:38:08.929792 kernel: Failed to create system directory sunrpc Jul 10 00:38:08.929817 kernel: Failed to create system directory sunrpc Jul 10 00:38:08.851000 audit[2855]: AVC avc: denied { confidentiality } for pid=2855 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:38:08.851000 audit[2855]: AVC avc: denied { confidentiality } for pid=2855 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:38:08.851000 audit[2855]: AVC avc: denied { confidentiality } for pid=2855 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:38:08.931868 kernel: Failed to create system directory sunrpc Jul 10 00:38:08.931888 kernel: Failed to create system directory sunrpc Jul 10 00:38:08.931907 kernel: Failed to create system directory sunrpc Jul 10 00:38:08.851000 audit[2855]: AVC avc: denied { confidentiality } for pid=2855 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:38:08.851000 audit[2855]: AVC avc: denied { confidentiality } for pid=2855 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:38:08.851000 audit[2855]: AVC avc: denied { confidentiality } for pid=2855 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:38:08.933942 kernel: Failed to create system directory sunrpc Jul 10 00:38:08.933962 kernel: Failed to create system directory sunrpc Jul 10 00:38:08.933984 kernel: Failed to create system directory sunrpc Jul 10 00:38:08.851000 audit[2855]: AVC avc: denied { confidentiality } for pid=2855 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:38:08.851000 audit[2855]: AVC avc: denied { confidentiality } for pid=2855 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:38:08.851000 audit[2855]: AVC avc: denied { confidentiality } for pid=2855 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:38:08.936022 kernel: Failed to create system directory sunrpc Jul 10 00:38:08.936048 kernel: Failed to create system directory sunrpc Jul 10 00:38:08.936065 kernel: Failed to create system directory sunrpc Jul 10 00:38:08.851000 audit[2855]: AVC avc: denied { confidentiality } for pid=2855 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:38:08.851000 audit[2855]: AVC avc: denied { confidentiality } for pid=2855 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:38:08.937429 kernel: Failed to create system directory sunrpc Jul 10 00:38:08.937464 kernel: Failed to create system directory sunrpc Jul 10 00:38:08.851000 audit[2855]: AVC avc: denied { confidentiality } for pid=2855 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:38:08.851000 audit[2855]: AVC avc: denied { confidentiality } for pid=2855 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:38:08.938792 kernel: Failed to create system directory sunrpc Jul 10 00:38:08.938818 kernel: Failed to create system directory sunrpc Jul 10 00:38:08.851000 audit[2855]: AVC avc: denied { confidentiality } for pid=2855 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:38:08.851000 audit[2855]: AVC avc: denied { confidentiality } for pid=2855 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:38:08.851000 audit[2855]: AVC avc: denied { confidentiality } for pid=2855 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:38:08.940939 kernel: Failed to create system directory sunrpc Jul 10 00:38:08.940976 kernel: Failed to create system directory sunrpc Jul 10 00:38:08.941013 kernel: Failed to create system directory sunrpc Jul 10 00:38:08.851000 audit[2855]: AVC avc: denied { confidentiality } for pid=2855 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:38:08.851000 audit[2855]: AVC avc: denied { confidentiality } for pid=2855 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:38:08.942429 kernel: Failed to create system directory sunrpc Jul 10 00:38:08.942475 kernel: Failed to create system directory sunrpc Jul 10 00:38:08.851000 audit[2855]: AVC avc: denied { confidentiality } for pid=2855 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:38:08.851000 audit[2855]: AVC avc: denied { confidentiality } for pid=2855 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:38:08.943873 kernel: Failed to create system directory sunrpc Jul 10 00:38:08.943906 kernel: Failed to create system directory sunrpc Jul 10 00:38:08.851000 audit[2855]: AVC avc: denied { confidentiality } for pid=2855 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:38:08.851000 audit[2855]: AVC avc: denied { confidentiality } for pid=2855 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:38:08.851000 audit[2855]: AVC avc: denied { confidentiality } for pid=2855 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:38:08.946044 kernel: Failed to create system directory sunrpc Jul 10 00:38:08.946079 kernel: Failed to create system directory sunrpc Jul 10 00:38:08.946112 kernel: Failed to create system directory sunrpc Jul 10 00:38:08.851000 audit[2855]: AVC avc: denied { confidentiality } for pid=2855 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:38:08.851000 audit[2855]: AVC avc: denied { confidentiality } for pid=2855 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:38:08.947550 kernel: Failed to create system directory sunrpc Jul 10 00:38:08.947603 kernel: Failed to create system directory sunrpc Jul 10 00:38:08.851000 audit[2855]: AVC avc: denied { confidentiality } for pid=2855 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:38:08.851000 audit[2855]: AVC avc: denied { confidentiality } for pid=2855 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:38:08.949076 kernel: Failed to create system directory sunrpc Jul 10 00:38:08.949136 kernel: Failed to create system directory sunrpc Jul 10 00:38:08.851000 audit[2855]: AVC avc: denied { confidentiality } for pid=2855 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:38:08.851000 audit[2855]: AVC avc: denied { confidentiality } for pid=2855 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:38:08.950616 kernel: Failed to create system directory sunrpc Jul 10 00:38:08.950654 kernel: Failed to create system directory sunrpc Jul 10 00:38:08.851000 audit[2855]: AVC avc: denied { confidentiality } for pid=2855 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:38:08.961645 kernel: RPC: Registered named UNIX socket transport module. Jul 10 00:38:08.961704 kernel: RPC: Registered udp transport module. Jul 10 00:38:08.961727 kernel: RPC: Registered tcp transport module. Jul 10 00:38:08.963238 kernel: RPC: Registered tcp NFSv4.1 backchannel transport module. Jul 10 00:38:08.851000 audit[2855]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=561f071b5ad0 a1=1a81bc a2=561ee09fc2b0 a3=5 items=6 ppid=71 pid=2855 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:38:08.851000 audit: CWD cwd="/" Jul 10 00:38:08.851000 audit: PATH item=0 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:38:08.851000 audit: PATH item=1 name=(null) inode=23136 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:38:08.851000 audit: PATH item=2 name=(null) inode=23136 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:38:08.851000 audit: PATH item=3 name=(null) inode=23137 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:38:08.851000 audit: PATH item=4 name=(null) inode=23136 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:38:08.851000 audit: PATH item=5 name=(null) inode=23138 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:38:08.851000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Jul 10 00:38:08.989000 audit[2855]: AVC avc: denied { confidentiality } for pid=2855 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:38:08.989000 audit[2855]: AVC avc: denied { confidentiality } for pid=2855 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:38:08.997693 kernel: Failed to create system directory nfs Jul 10 00:38:08.997874 kernel: Failed to create system directory nfs Jul 10 00:38:08.997898 kernel: Failed to create system directory nfs Jul 10 00:38:08.989000 audit[2855]: AVC avc: denied { confidentiality } for pid=2855 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:38:08.989000 audit[2855]: AVC avc: denied { confidentiality } for pid=2855 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:38:08.998984 kernel: Failed to create system directory nfs Jul 10 00:38:08.999032 kernel: Failed to create system directory nfs Jul 10 00:38:08.989000 audit[2855]: AVC avc: denied { confidentiality } for pid=2855 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:38:08.989000 audit[2855]: AVC avc: denied { confidentiality } for pid=2855 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:38:08.989000 audit[2855]: AVC avc: denied { confidentiality } for pid=2855 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:38:09.000963 kernel: Failed to create system directory nfs Jul 10 00:38:09.000986 kernel: Failed to create system directory nfs Jul 10 00:38:09.001007 kernel: Failed to create system directory nfs Jul 10 00:38:08.989000 audit[2855]: AVC avc: denied { confidentiality } for pid=2855 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:38:08.989000 audit[2855]: AVC avc: denied { confidentiality } for pid=2855 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:38:08.989000 audit[2855]: AVC avc: denied { confidentiality } for pid=2855 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:38:09.002934 kernel: Failed to create system directory nfs Jul 10 00:38:09.002960 kernel: Failed to create system directory nfs Jul 10 00:38:09.002983 kernel: Failed to create system directory nfs Jul 10 00:38:08.989000 audit[2855]: AVC avc: denied { confidentiality } for pid=2855 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:38:08.989000 audit[2855]: AVC avc: denied { confidentiality } for pid=2855 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:38:08.989000 audit[2855]: AVC avc: denied { confidentiality } for pid=2855 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:38:09.004895 kernel: Failed to create system directory nfs Jul 10 00:38:09.004929 kernel: Failed to create system directory nfs Jul 10 00:38:09.004948 kernel: Failed to create system directory nfs Jul 10 00:38:08.989000 audit[2855]: AVC avc: denied { confidentiality } for pid=2855 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:38:08.989000 audit[2855]: AVC avc: denied { confidentiality } for pid=2855 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:38:08.989000 audit[2855]: AVC avc: denied { confidentiality } for pid=2855 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:38:09.006861 kernel: Failed to create system directory nfs Jul 10 00:38:09.006895 kernel: Failed to create system directory nfs Jul 10 00:38:09.006910 kernel: Failed to create system directory nfs Jul 10 00:38:08.989000 audit[2855]: AVC avc: denied { confidentiality } for pid=2855 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:38:08.989000 audit[2855]: AVC avc: denied { confidentiality } for pid=2855 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:38:08.989000 audit[2855]: AVC avc: denied { confidentiality } for pid=2855 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:38:09.008849 kernel: Failed to create system directory nfs Jul 10 00:38:09.008885 kernel: Failed to create system directory nfs Jul 10 00:38:09.008905 kernel: Failed to create system directory nfs Jul 10 00:38:08.989000 audit[2855]: AVC avc: denied { confidentiality } for pid=2855 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:38:08.989000 audit[2855]: AVC avc: denied { confidentiality } for pid=2855 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:38:08.989000 audit[2855]: AVC avc: denied { confidentiality } for pid=2855 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:38:09.010894 kernel: Failed to create system directory nfs Jul 10 00:38:09.010935 kernel: Failed to create system directory nfs Jul 10 00:38:09.010953 kernel: Failed to create system directory nfs Jul 10 00:38:08.989000 audit[2855]: AVC avc: denied { confidentiality } for pid=2855 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:38:08.989000 audit[2855]: AVC avc: denied { confidentiality } for pid=2855 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:38:08.989000 audit[2855]: AVC avc: denied { confidentiality } for pid=2855 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:38:09.012897 kernel: Failed to create system directory nfs Jul 10 00:38:09.012929 kernel: Failed to create system directory nfs Jul 10 00:38:09.012947 kernel: Failed to create system directory nfs Jul 10 00:38:08.989000 audit[2855]: AVC avc: denied { confidentiality } for pid=2855 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:38:08.989000 audit[2855]: AVC avc: denied { confidentiality } for pid=2855 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:38:08.989000 audit[2855]: AVC avc: denied { confidentiality } for pid=2855 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:38:09.014923 kernel: Failed to create system directory nfs Jul 10 00:38:09.014952 kernel: Failed to create system directory nfs Jul 10 00:38:09.014979 kernel: Failed to create system directory nfs Jul 10 00:38:08.989000 audit[2855]: AVC avc: denied { confidentiality } for pid=2855 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:38:08.989000 audit[2855]: AVC avc: denied { confidentiality } for pid=2855 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:38:08.989000 audit[2855]: AVC avc: denied { confidentiality } for pid=2855 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:38:09.016929 kernel: Failed to create system directory nfs Jul 10 00:38:09.016972 kernel: Failed to create system directory nfs Jul 10 00:38:09.016992 kernel: Failed to create system directory nfs Jul 10 00:38:08.989000 audit[2855]: AVC avc: denied { confidentiality } for pid=2855 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:38:08.989000 audit[2855]: AVC avc: denied { confidentiality } for pid=2855 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:38:08.989000 audit[2855]: AVC avc: denied { confidentiality } for pid=2855 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:38:09.018930 kernel: Failed to create system directory nfs Jul 10 00:38:09.018980 kernel: Failed to create system directory nfs Jul 10 00:38:09.019003 kernel: Failed to create system directory nfs Jul 10 00:38:08.989000 audit[2855]: AVC avc: denied { confidentiality } for pid=2855 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:38:08.989000 audit[2855]: AVC avc: denied { confidentiality } for pid=2855 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:38:08.989000 audit[2855]: AVC avc: denied { confidentiality } for pid=2855 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:38:09.020969 kernel: Failed to create system directory nfs Jul 10 00:38:09.021008 kernel: Failed to create system directory nfs Jul 10 00:38:09.021031 kernel: Failed to create system directory nfs Jul 10 00:38:08.989000 audit[2855]: AVC avc: denied { confidentiality } for pid=2855 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:38:08.989000 audit[2855]: AVC avc: denied { confidentiality } for pid=2855 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:38:08.989000 audit[2855]: AVC avc: denied { confidentiality } for pid=2855 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:38:09.023000 kernel: Failed to create system directory nfs Jul 10 00:38:09.023041 kernel: Failed to create system directory nfs Jul 10 00:38:09.023060 kernel: Failed to create system directory nfs Jul 10 00:38:08.989000 audit[2855]: AVC avc: denied { confidentiality } for pid=2855 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:38:08.989000 audit[2855]: AVC avc: denied { confidentiality } for pid=2855 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:38:08.989000 audit[2855]: AVC avc: denied { confidentiality } for pid=2855 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:38:09.024987 kernel: Failed to create system directory nfs Jul 10 00:38:09.025037 kernel: Failed to create system directory nfs Jul 10 00:38:09.025066 kernel: Failed to create system directory nfs Jul 10 00:38:08.989000 audit[2855]: AVC avc: denied { confidentiality } for pid=2855 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:38:09.025659 kernel: Failed to create system directory nfs Jul 10 00:38:08.989000 audit[2855]: AVC avc: denied { confidentiality } for pid=2855 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:38:08.989000 audit[2855]: AVC avc: denied { confidentiality } for pid=2855 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:38:09.027007 kernel: Failed to create system directory nfs Jul 10 00:38:09.027060 kernel: Failed to create system directory nfs Jul 10 00:38:08.989000 audit[2855]: AVC avc: denied { confidentiality } for pid=2855 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:38:08.989000 audit[2855]: AVC avc: denied { confidentiality } for pid=2855 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:38:08.989000 audit[2855]: AVC avc: denied { confidentiality } for pid=2855 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:38:09.029002 kernel: Failed to create system directory nfs Jul 10 00:38:09.029043 kernel: Failed to create system directory nfs Jul 10 00:38:09.029074 kernel: Failed to create system directory nfs Jul 10 00:38:08.989000 audit[2855]: AVC avc: denied { confidentiality } for pid=2855 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:38:09.029668 kernel: Failed to create system directory nfs Jul 10 00:38:08.989000 audit[2855]: AVC avc: denied { confidentiality } for pid=2855 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:38:08.989000 audit[2855]: AVC avc: denied { confidentiality } for pid=2855 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:38:09.030981 kernel: Failed to create system directory nfs Jul 10 00:38:09.031020 kernel: Failed to create system directory nfs Jul 10 00:38:08.989000 audit[2855]: AVC avc: denied { confidentiality } for pid=2855 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:38:08.989000 audit[2855]: AVC avc: denied { confidentiality } for pid=2855 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:38:08.989000 audit[2855]: AVC avc: denied { confidentiality } for pid=2855 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:38:09.032943 kernel: Failed to create system directory nfs Jul 10 00:38:09.032981 kernel: Failed to create system directory nfs Jul 10 00:38:09.033000 kernel: Failed to create system directory nfs Jul 10 00:38:08.989000 audit[2855]: AVC avc: denied { confidentiality } for pid=2855 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:38:09.033611 kernel: Failed to create system directory nfs Jul 10 00:38:08.989000 audit[2855]: AVC avc: denied { confidentiality } for pid=2855 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:38:08.989000 audit[2855]: AVC avc: denied { confidentiality } for pid=2855 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:38:09.034933 kernel: Failed to create system directory nfs Jul 10 00:38:09.034971 kernel: Failed to create system directory nfs Jul 10 00:38:08.989000 audit[2855]: AVC avc: denied { confidentiality } for pid=2855 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:38:09.035590 kernel: Failed to create system directory nfs Jul 10 00:38:08.989000 audit[2855]: AVC avc: denied { confidentiality } for pid=2855 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:38:08.989000 audit[2855]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=561f073d6af0 a1=16ec44 a2=561ee09fc2b0 a3=5 items=0 ppid=71 pid=2855 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:38:08.989000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Jul 10 00:38:09.058440 kernel: FS-Cache: Netfs 'nfs' registered for caching Jul 10 00:38:09.087000 audit[2860]: AVC avc: denied { confidentiality } for pid=2860 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:38:09.087000 audit[2860]: AVC avc: denied { confidentiality } for pid=2860 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:38:09.103104 kernel: Failed to create system directory nfs4 Jul 10 00:38:09.103198 kernel: Failed to create system directory nfs4 Jul 10 00:38:09.103225 kernel: Failed to create system directory nfs4 Jul 10 00:38:09.087000 audit[2860]: AVC avc: denied { confidentiality } for pid=2860 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:38:09.087000 audit[2860]: AVC avc: denied { confidentiality } for pid=2860 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:38:09.104976 kernel: Failed to create system directory nfs4 Jul 10 00:38:09.105018 kernel: Failed to create system directory nfs4 Jul 10 00:38:09.087000 audit[2860]: AVC avc: denied { confidentiality } for pid=2860 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:38:09.087000 audit[2860]: AVC avc: denied { confidentiality } for pid=2860 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:38:09.087000 audit[2860]: AVC avc: denied { confidentiality } for pid=2860 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:38:09.107082 kernel: Failed to create system directory nfs4 Jul 10 00:38:09.107135 kernel: Failed to create system directory nfs4 Jul 10 00:38:09.107154 kernel: Failed to create system directory nfs4 Jul 10 00:38:09.087000 audit[2860]: AVC avc: denied { confidentiality } for pid=2860 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:38:09.087000 audit[2860]: AVC avc: denied { confidentiality } for pid=2860 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:38:09.108480 kernel: Failed to create system directory nfs4 Jul 10 00:38:09.108516 kernel: Failed to create system directory nfs4 Jul 10 00:38:09.087000 audit[2860]: AVC avc: denied { confidentiality } for pid=2860 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:38:09.087000 audit[2860]: AVC avc: denied { confidentiality } for pid=2860 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:38:09.109888 kernel: Failed to create system directory nfs4 Jul 10 00:38:09.109936 kernel: Failed to create system directory nfs4 Jul 10 00:38:09.087000 audit[2860]: AVC avc: denied { confidentiality } for pid=2860 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:38:09.087000 audit[2860]: AVC avc: denied { confidentiality } for pid=2860 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:38:09.087000 audit[2860]: AVC avc: denied { confidentiality } for pid=2860 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:38:09.111958 kernel: Failed to create system directory nfs4 Jul 10 00:38:09.111993 kernel: Failed to create system directory nfs4 Jul 10 00:38:09.112022 kernel: Failed to create system directory nfs4 Jul 10 00:38:09.087000 audit[2860]: AVC avc: denied { confidentiality } for pid=2860 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:38:09.113434 kernel: Failed to create system directory nfs4 Jul 10 00:38:09.113472 kernel: Failed to create system directory nfs4 Jul 10 00:38:09.087000 audit[2860]: AVC avc: denied { confidentiality } for pid=2860 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:38:09.087000 audit[2860]: AVC avc: denied { confidentiality } for pid=2860 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:38:09.087000 audit[2860]: AVC avc: denied { confidentiality } for pid=2860 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:38:09.114852 kernel: Failed to create system directory nfs4 Jul 10 00:38:09.114887 kernel: Failed to create system directory nfs4 Jul 10 00:38:09.087000 audit[2860]: AVC avc: denied { confidentiality } for pid=2860 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:38:09.087000 audit[2860]: AVC avc: denied { confidentiality } for pid=2860 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:38:09.087000 audit[2860]: AVC avc: denied { confidentiality } for pid=2860 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:38:09.116982 kernel: Failed to create system directory nfs4 Jul 10 00:38:09.117030 kernel: Failed to create system directory nfs4 Jul 10 00:38:09.117050 kernel: Failed to create system directory nfs4 Jul 10 00:38:09.087000 audit[2860]: AVC avc: denied { confidentiality } for pid=2860 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:38:09.087000 audit[2860]: AVC avc: denied { confidentiality } for pid=2860 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:38:09.118497 kernel: Failed to create system directory nfs4 Jul 10 00:38:09.087000 audit[2860]: AVC avc: denied { confidentiality } for pid=2860 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:38:09.087000 audit[2860]: AVC avc: denied { confidentiality } for pid=2860 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:38:09.119913 kernel: Failed to create system directory nfs4 Jul 10 00:38:09.119954 kernel: Failed to create system directory nfs4 Jul 10 00:38:09.119973 kernel: Failed to create system directory nfs4 Jul 10 00:38:09.087000 audit[2860]: AVC avc: denied { confidentiality } for pid=2860 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:38:09.087000 audit[2860]: AVC avc: denied { confidentiality } for pid=2860 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:38:09.087000 audit[2860]: AVC avc: denied { confidentiality } for pid=2860 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:38:09.122002 kernel: Failed to create system directory nfs4 Jul 10 00:38:09.122040 kernel: Failed to create system directory nfs4 Jul 10 00:38:09.122065 kernel: Failed to create system directory nfs4 Jul 10 00:38:09.087000 audit[2860]: AVC avc: denied { confidentiality } for pid=2860 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:38:09.087000 audit[2860]: AVC avc: denied { confidentiality } for pid=2860 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:38:09.123444 kernel: Failed to create system directory nfs4 Jul 10 00:38:09.123494 kernel: Failed to create system directory nfs4 Jul 10 00:38:09.087000 audit[2860]: AVC avc: denied { confidentiality } for pid=2860 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:38:09.087000 audit[2860]: AVC avc: denied { confidentiality } for pid=2860 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:38:09.124838 kernel: Failed to create system directory nfs4 Jul 10 00:38:09.124879 kernel: Failed to create system directory nfs4 Jul 10 00:38:09.087000 audit[2860]: AVC avc: denied { confidentiality } for pid=2860 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:38:09.087000 audit[2860]: AVC avc: denied { confidentiality } for pid=2860 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:38:09.087000 audit[2860]: AVC avc: denied { confidentiality } for pid=2860 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:38:09.126962 kernel: Failed to create system directory nfs4 Jul 10 00:38:09.126997 kernel: Failed to create system directory nfs4 Jul 10 00:38:09.127016 kernel: Failed to create system directory nfs4 Jul 10 00:38:09.087000 audit[2860]: AVC avc: denied { confidentiality } for pid=2860 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:38:09.087000 audit[2860]: AVC avc: denied { confidentiality } for pid=2860 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:38:09.128430 kernel: Failed to create system directory nfs4 Jul 10 00:38:09.128463 kernel: Failed to create system directory nfs4 Jul 10 00:38:09.087000 audit[2860]: AVC avc: denied { confidentiality } for pid=2860 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:38:09.087000 audit[2860]: AVC avc: denied { confidentiality } for pid=2860 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:38:09.129818 kernel: Failed to create system directory nfs4 Jul 10 00:38:09.129852 kernel: Failed to create system directory nfs4 Jul 10 00:38:09.087000 audit[2860]: AVC avc: denied { confidentiality } for pid=2860 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:38:09.087000 audit[2860]: AVC avc: denied { confidentiality } for pid=2860 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:38:09.087000 audit[2860]: AVC avc: denied { confidentiality } for pid=2860 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:38:09.131995 kernel: Failed to create system directory nfs4 Jul 10 00:38:09.132028 kernel: Failed to create system directory nfs4 Jul 10 00:38:09.132048 kernel: Failed to create system directory nfs4 Jul 10 00:38:09.087000 audit[2860]: AVC avc: denied { confidentiality } for pid=2860 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:38:09.087000 audit[2860]: AVC avc: denied { confidentiality } for pid=2860 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:38:09.133436 kernel: Failed to create system directory nfs4 Jul 10 00:38:09.133476 kernel: Failed to create system directory nfs4 Jul 10 00:38:09.087000 audit[2860]: AVC avc: denied { confidentiality } for pid=2860 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:38:09.087000 audit[2860]: AVC avc: denied { confidentiality } for pid=2860 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:38:09.134892 kernel: Failed to create system directory nfs4 Jul 10 00:38:09.134935 kernel: Failed to create system directory nfs4 Jul 10 00:38:09.087000 audit[2860]: AVC avc: denied { confidentiality } for pid=2860 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:38:09.087000 audit[2860]: AVC avc: denied { confidentiality } for pid=2860 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:38:09.136446 kernel: Failed to create system directory nfs4 Jul 10 00:38:09.087000 audit[2860]: AVC avc: denied { confidentiality } for pid=2860 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:38:09.087000 audit[2860]: AVC avc: denied { confidentiality } for pid=2860 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:38:09.137865 kernel: Failed to create system directory nfs4 Jul 10 00:38:09.137897 kernel: Failed to create system directory nfs4 Jul 10 00:38:09.137912 kernel: Failed to create system directory nfs4 Jul 10 00:38:09.087000 audit[2860]: AVC avc: denied { confidentiality } for pid=2860 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:38:09.087000 audit[2860]: AVC avc: denied { confidentiality } for pid=2860 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:38:09.087000 audit[2860]: AVC avc: denied { confidentiality } for pid=2860 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:38:09.139912 kernel: Failed to create system directory nfs4 Jul 10 00:38:09.139944 kernel: Failed to create system directory nfs4 Jul 10 00:38:09.139965 kernel: Failed to create system directory nfs4 Jul 10 00:38:09.087000 audit[2860]: AVC avc: denied { confidentiality } for pid=2860 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:38:09.087000 audit[2860]: AVC avc: denied { confidentiality } for pid=2860 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:38:09.087000 audit[2860]: AVC avc: denied { confidentiality } for pid=2860 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:38:09.141977 kernel: Failed to create system directory nfs4 Jul 10 00:38:09.142023 kernel: Failed to create system directory nfs4 Jul 10 00:38:09.142039 kernel: Failed to create system directory nfs4 Jul 10 00:38:09.087000 audit[2860]: AVC avc: denied { confidentiality } for pid=2860 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:38:09.087000 audit[2860]: AVC avc: denied { confidentiality } for pid=2860 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:38:09.143429 kernel: Failed to create system directory nfs4 Jul 10 00:38:09.143452 kernel: Failed to create system directory nfs4 Jul 10 00:38:09.087000 audit[2860]: AVC avc: denied { confidentiality } for pid=2860 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:38:09.087000 audit[2860]: AVC avc: denied { confidentiality } for pid=2860 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:38:09.144788 kernel: Failed to create system directory nfs4 Jul 10 00:38:09.144812 kernel: Failed to create system directory nfs4 Jul 10 00:38:09.087000 audit[2860]: AVC avc: denied { confidentiality } for pid=2860 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:38:09.087000 audit[2860]: AVC avc: denied { confidentiality } for pid=2860 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:38:09.087000 audit[2860]: AVC avc: denied { confidentiality } for pid=2860 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:38:09.146810 kernel: Failed to create system directory nfs4 Jul 10 00:38:09.146838 kernel: Failed to create system directory nfs4 Jul 10 00:38:09.146853 kernel: Failed to create system directory nfs4 Jul 10 00:38:09.087000 audit[2860]: AVC avc: denied { confidentiality } for pid=2860 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:38:09.087000 audit[2860]: AVC avc: denied { confidentiality } for pid=2860 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:38:09.087000 audit[2860]: AVC avc: denied { confidentiality } for pid=2860 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:38:09.148850 kernel: Failed to create system directory nfs4 Jul 10 00:38:09.148873 kernel: Failed to create system directory nfs4 Jul 10 00:38:09.148887 kernel: Failed to create system directory nfs4 Jul 10 00:38:09.087000 audit[2860]: AVC avc: denied { confidentiality } for pid=2860 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:38:09.087000 audit[2860]: AVC avc: denied { confidentiality } for pid=2860 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:38:09.087000 audit[2860]: AVC avc: denied { confidentiality } for pid=2860 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:38:09.150887 kernel: Failed to create system directory nfs4 Jul 10 00:38:09.150909 kernel: Failed to create system directory nfs4 Jul 10 00:38:09.150923 kernel: Failed to create system directory nfs4 Jul 10 00:38:09.087000 audit[2860]: AVC avc: denied { confidentiality } for pid=2860 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:38:09.087000 audit[2860]: AVC avc: denied { confidentiality } for pid=2860 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:38:09.087000 audit[2860]: AVC avc: denied { confidentiality } for pid=2860 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:38:09.152944 kernel: Failed to create system directory nfs4 Jul 10 00:38:09.152979 kernel: Failed to create system directory nfs4 Jul 10 00:38:09.152994 kernel: Failed to create system directory nfs4 Jul 10 00:38:09.087000 audit[2860]: AVC avc: denied { confidentiality } for pid=2860 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:38:09.087000 audit[2860]: AVC avc: denied { confidentiality } for pid=2860 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:38:09.087000 audit[2860]: AVC avc: denied { confidentiality } for pid=2860 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:38:09.155025 kernel: Failed to create system directory nfs4 Jul 10 00:38:09.155045 kernel: Failed to create system directory nfs4 Jul 10 00:38:09.087000 audit[2860]: AVC avc: denied { confidentiality } for pid=2860 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:38:09.155748 kernel: Failed to create system directory nfs4 Jul 10 00:38:09.155777 kernel: Failed to create system directory nfs4 Jul 10 00:38:09.087000 audit[2860]: AVC avc: denied { confidentiality } for pid=2860 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:38:09.156431 kernel: Failed to create system directory nfs4 Jul 10 00:38:09.087000 audit[2860]: AVC avc: denied { confidentiality } for pid=2860 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:38:09.087000 audit[2860]: AVC avc: denied { confidentiality } for pid=2860 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:38:09.157732 kernel: Failed to create system directory nfs4 Jul 10 00:38:09.157767 kernel: Failed to create system directory nfs4 Jul 10 00:38:09.087000 audit[2860]: AVC avc: denied { confidentiality } for pid=2860 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:38:09.087000 audit[2860]: AVC avc: denied { confidentiality } for pid=2860 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:38:09.159006 kernel: Failed to create system directory nfs4 Jul 10 00:38:09.159078 kernel: Failed to create system directory nfs4 Jul 10 00:38:09.087000 audit[2860]: AVC avc: denied { confidentiality } for pid=2860 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:38:09.087000 audit[2860]: AVC avc: denied { confidentiality } for pid=2860 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:38:09.087000 audit[2860]: AVC avc: denied { confidentiality } for pid=2860 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:38:09.160975 kernel: Failed to create system directory nfs4 Jul 10 00:38:09.160999 kernel: Failed to create system directory nfs4 Jul 10 00:38:09.161013 kernel: Failed to create system directory nfs4 Jul 10 00:38:09.087000 audit[2860]: AVC avc: denied { confidentiality } for pid=2860 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:38:09.087000 audit[2860]: AVC avc: denied { confidentiality } for pid=2860 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:38:09.087000 audit[2860]: AVC avc: denied { confidentiality } for pid=2860 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:38:09.162945 kernel: Failed to create system directory nfs4 Jul 10 00:38:09.162982 kernel: Failed to create system directory nfs4 Jul 10 00:38:09.163006 kernel: Failed to create system directory nfs4 Jul 10 00:38:09.087000 audit[2860]: AVC avc: denied { confidentiality } for pid=2860 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:38:09.087000 audit[2860]: AVC avc: denied { confidentiality } for pid=2860 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:38:09.087000 audit[2860]: AVC avc: denied { confidentiality } for pid=2860 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:38:09.164897 kernel: Failed to create system directory nfs4 Jul 10 00:38:09.164918 kernel: Failed to create system directory nfs4 Jul 10 00:38:09.164933 kernel: Failed to create system directory nfs4 Jul 10 00:38:09.087000 audit[2860]: AVC avc: denied { confidentiality } for pid=2860 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:38:09.087000 audit[2860]: AVC avc: denied { confidentiality } for pid=2860 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:38:09.087000 audit[2860]: AVC avc: denied { confidentiality } for pid=2860 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:38:09.166862 kernel: Failed to create system directory nfs4 Jul 10 00:38:09.166908 kernel: Failed to create system directory nfs4 Jul 10 00:38:09.166924 kernel: Failed to create system directory nfs4 Jul 10 00:38:09.087000 audit[2860]: AVC avc: denied { confidentiality } for pid=2860 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:38:09.268877 kubelet[1438]: E0710 00:38:09.268818 1438 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 00:38:09.304726 kernel: NFS: Registering the id_resolver key type Jul 10 00:38:09.304787 kernel: Key type id_resolver registered Jul 10 00:38:09.304804 kernel: Key type id_legacy registered Jul 10 00:38:09.087000 audit[2860]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=7f90b7c01010 a1=20956c a2=561458f6b2b0 a3=5 items=0 ppid=71 pid=2860 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:38:09.087000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D006E66737634 Jul 10 00:38:09.312000 audit[2861]: AVC avc: denied { confidentiality } for pid=2861 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:38:09.312000 audit[2861]: AVC avc: denied { confidentiality } for pid=2861 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:38:09.316657 kernel: Failed to create system directory rpcgss Jul 10 00:38:09.316762 kernel: Failed to create system directory rpcgss Jul 10 00:38:09.316778 kernel: Failed to create system directory rpcgss Jul 10 00:38:09.312000 audit[2861]: AVC avc: denied { confidentiality } for pid=2861 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:38:09.312000 audit[2861]: AVC avc: denied { confidentiality } for pid=2861 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:38:09.318044 kernel: Failed to create system directory rpcgss Jul 10 00:38:09.318078 kernel: Failed to create system directory rpcgss Jul 10 00:38:09.312000 audit[2861]: AVC avc: denied { confidentiality } for pid=2861 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:38:09.312000 audit[2861]: AVC avc: denied { confidentiality } for pid=2861 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:38:09.312000 audit[2861]: AVC avc: denied { confidentiality } for pid=2861 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:38:09.320132 kernel: Failed to create system directory rpcgss Jul 10 00:38:09.320166 kernel: Failed to create system directory rpcgss Jul 10 00:38:09.320189 kernel: Failed to create system directory rpcgss Jul 10 00:38:09.312000 audit[2861]: AVC avc: denied { confidentiality } for pid=2861 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:38:09.312000 audit[2861]: AVC avc: denied { confidentiality } for pid=2861 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:38:09.321519 kernel: Failed to create system directory rpcgss Jul 10 00:38:09.321544 kernel: Failed to create system directory rpcgss Jul 10 00:38:09.312000 audit[2861]: AVC avc: denied { confidentiality } for pid=2861 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:38:09.312000 audit[2861]: AVC avc: denied { confidentiality } for pid=2861 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:38:09.322934 kernel: Failed to create system directory rpcgss Jul 10 00:38:09.322960 kernel: Failed to create system directory rpcgss Jul 10 00:38:09.312000 audit[2861]: AVC avc: denied { confidentiality } for pid=2861 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:38:09.312000 audit[2861]: AVC avc: denied { confidentiality } for pid=2861 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:38:09.312000 audit[2861]: AVC avc: denied { confidentiality } for pid=2861 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:38:09.324990 kernel: Failed to create system directory rpcgss Jul 10 00:38:09.325012 kernel: Failed to create system directory rpcgss Jul 10 00:38:09.325026 kernel: Failed to create system directory rpcgss Jul 10 00:38:09.312000 audit[2861]: AVC avc: denied { confidentiality } for pid=2861 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:38:09.312000 audit[2861]: AVC avc: denied { confidentiality } for pid=2861 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:38:09.326454 kernel: Failed to create system directory rpcgss Jul 10 00:38:09.326488 kernel: Failed to create system directory rpcgss Jul 10 00:38:09.312000 audit[2861]: AVC avc: denied { confidentiality } for pid=2861 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:38:09.312000 audit[2861]: AVC avc: denied { confidentiality } for pid=2861 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:38:09.327827 kernel: Failed to create system directory rpcgss Jul 10 00:38:09.327861 kernel: Failed to create system directory rpcgss Jul 10 00:38:09.312000 audit[2861]: AVC avc: denied { confidentiality } for pid=2861 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:38:09.328566 kernel: Failed to create system directory rpcgss Jul 10 00:38:09.312000 audit[2861]: AVC avc: denied { confidentiality } for pid=2861 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:38:09.312000 audit[2861]: AVC avc: denied { confidentiality } for pid=2861 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:38:09.329956 kernel: Failed to create system directory rpcgss Jul 10 00:38:09.329998 kernel: Failed to create system directory rpcgss Jul 10 00:38:09.312000 audit[2861]: AVC avc: denied { confidentiality } for pid=2861 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:38:09.312000 audit[2861]: AVC avc: denied { confidentiality } for pid=2861 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:38:09.312000 audit[2861]: AVC avc: denied { confidentiality } for pid=2861 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:38:09.332028 kernel: Failed to create system directory rpcgss Jul 10 00:38:09.332058 kernel: Failed to create system directory rpcgss Jul 10 00:38:09.332073 kernel: Failed to create system directory rpcgss Jul 10 00:38:09.312000 audit[2861]: AVC avc: denied { confidentiality } for pid=2861 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:38:09.312000 audit[2861]: AVC avc: denied { confidentiality } for pid=2861 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:38:09.333440 kernel: Failed to create system directory rpcgss Jul 10 00:38:09.312000 audit[2861]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=7fc94519d010 a1=70bac a2=557eb23692b0 a3=5 items=0 ppid=71 pid=2861 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:38:09.312000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D007270632D617574682D36 Jul 10 00:38:09.349655 nfsidmap[2871]: nss_getpwnam: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain 'localdomain' Jul 10 00:38:09.352495 nfsidmap[2874]: nss_name_to_gid: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain 'localdomain' Jul 10 00:38:09.366000 audit[1259]: AVC avc: denied { watch_reads } for pid=1259 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2628 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Jul 10 00:38:09.366000 audit[1259]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=55c80ca05e00 a2=10 a3=a9cdec17dd74dc82 items=0 ppid=1 pid=1259 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:38:09.366000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Jul 10 00:38:09.366000 audit[1259]: AVC avc: denied { watch_reads } for pid=1259 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2628 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Jul 10 00:38:09.366000 audit[1259]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=55c80ca05e00 a2=10 a3=a9cdec17dd74dc82 items=0 ppid=1 pid=1259 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:38:09.366000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Jul 10 00:38:09.366000 audit[1259]: AVC avc: denied { watch_reads } for pid=1259 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2628 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Jul 10 00:38:09.366000 audit[1259]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=55c80ca05e00 a2=10 a3=a9cdec17dd74dc82 items=0 ppid=1 pid=1259 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:38:09.366000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Jul 10 00:38:09.366000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2628 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Jul 10 00:38:09.366000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2628 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Jul 10 00:38:09.366000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2628 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Jul 10 00:38:09.379000 audit[2878]: NETFILTER_CFG table=filter:98 family=2 entries=9 op=nft_register_rule pid=2878 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 10 00:38:09.379000 audit[2878]: SYSCALL arch=c000003e syscall=46 success=yes exit=3016 a0=3 a1=7fff539900e0 a2=0 a3=7fff539900cc items=0 ppid=1656 pid=2878 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:38:09.379000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 10 00:38:09.387000 audit[2878]: NETFILTER_CFG table=nat:99 family=2 entries=55 op=nft_register_chain pid=2878 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 10 00:38:09.387000 audit[2878]: SYSCALL arch=c000003e syscall=46 success=yes exit=20100 a0=3 a1=7fff539900e0 a2=0 a3=7fff539900cc items=0 ppid=1656 pid=2878 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:38:09.387000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 10 00:38:09.467140 env[1200]: time="2025-07-10T00:38:09.467071751Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:36aac103-c1b7-4ee0-945d-35c9673eab44,Namespace:default,Attempt:0,}" Jul 10 00:38:09.698037 systemd-networkd[1022]: cali5ec59c6bf6e: Link UP Jul 10 00:38:09.700671 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Jul 10 00:38:09.700708 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali5ec59c6bf6e: link becomes ready Jul 10 00:38:09.700605 systemd-networkd[1022]: cali5ec59c6bf6e: Gained carrier Jul 10 00:38:09.712135 env[1200]: 2025-07-10 00:38:09.642 [INFO][2879] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.0.0.41-k8s-test--pod--1-eth0 default 36aac103-c1b7-4ee0-945d-35c9673eab44 1356 0 2025-07-10 00:37:53 +0000 UTC map[projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 10.0.0.41 test-pod-1 eth0 default [] [] [kns.default ksa.default.default] cali5ec59c6bf6e [] [] }} ContainerID="33ed43feb7cf73aa774e8a2ad996c175928643f981228b060117c24b79775d85" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.41-k8s-test--pod--1-" Jul 10 00:38:09.712135 env[1200]: 2025-07-10 00:38:09.642 [INFO][2879] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="33ed43feb7cf73aa774e8a2ad996c175928643f981228b060117c24b79775d85" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.41-k8s-test--pod--1-eth0" Jul 10 00:38:09.712135 env[1200]: 2025-07-10 00:38:09.663 [INFO][2893] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="33ed43feb7cf73aa774e8a2ad996c175928643f981228b060117c24b79775d85" HandleID="k8s-pod-network.33ed43feb7cf73aa774e8a2ad996c175928643f981228b060117c24b79775d85" Workload="10.0.0.41-k8s-test--pod--1-eth0" Jul 10 00:38:09.712135 env[1200]: 2025-07-10 00:38:09.663 [INFO][2893] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="33ed43feb7cf73aa774e8a2ad996c175928643f981228b060117c24b79775d85" HandleID="k8s-pod-network.33ed43feb7cf73aa774e8a2ad996c175928643f981228b060117c24b79775d85" Workload="10.0.0.41-k8s-test--pod--1-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000122e70), Attrs:map[string]string{"namespace":"default", "node":"10.0.0.41", "pod":"test-pod-1", "timestamp":"2025-07-10 00:38:09.663527395 +0000 UTC"}, Hostname:"10.0.0.41", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Jul 10 00:38:09.712135 env[1200]: 2025-07-10 00:38:09.663 [INFO][2893] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Jul 10 00:38:09.712135 env[1200]: 2025-07-10 00:38:09.663 [INFO][2893] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Jul 10 00:38:09.712135 env[1200]: 2025-07-10 00:38:09.663 [INFO][2893] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.0.0.41' Jul 10 00:38:09.712135 env[1200]: 2025-07-10 00:38:09.670 [INFO][2893] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.33ed43feb7cf73aa774e8a2ad996c175928643f981228b060117c24b79775d85" host="10.0.0.41" Jul 10 00:38:09.712135 env[1200]: 2025-07-10 00:38:09.675 [INFO][2893] ipam/ipam.go 394: Looking up existing affinities for host host="10.0.0.41" Jul 10 00:38:09.712135 env[1200]: 2025-07-10 00:38:09.679 [INFO][2893] ipam/ipam.go 511: Trying affinity for 192.168.46.128/26 host="10.0.0.41" Jul 10 00:38:09.712135 env[1200]: 2025-07-10 00:38:09.680 [INFO][2893] ipam/ipam.go 158: Attempting to load block cidr=192.168.46.128/26 host="10.0.0.41" Jul 10 00:38:09.712135 env[1200]: 2025-07-10 00:38:09.682 [INFO][2893] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.46.128/26 host="10.0.0.41" Jul 10 00:38:09.712135 env[1200]: 2025-07-10 00:38:09.682 [INFO][2893] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.46.128/26 handle="k8s-pod-network.33ed43feb7cf73aa774e8a2ad996c175928643f981228b060117c24b79775d85" host="10.0.0.41" Jul 10 00:38:09.712135 env[1200]: 2025-07-10 00:38:09.684 [INFO][2893] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.33ed43feb7cf73aa774e8a2ad996c175928643f981228b060117c24b79775d85 Jul 10 00:38:09.712135 env[1200]: 2025-07-10 00:38:09.687 [INFO][2893] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.46.128/26 handle="k8s-pod-network.33ed43feb7cf73aa774e8a2ad996c175928643f981228b060117c24b79775d85" host="10.0.0.41" Jul 10 00:38:09.712135 env[1200]: 2025-07-10 00:38:09.694 [INFO][2893] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.46.132/26] block=192.168.46.128/26 handle="k8s-pod-network.33ed43feb7cf73aa774e8a2ad996c175928643f981228b060117c24b79775d85" host="10.0.0.41" Jul 10 00:38:09.712135 env[1200]: 2025-07-10 00:38:09.694 [INFO][2893] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.46.132/26] handle="k8s-pod-network.33ed43feb7cf73aa774e8a2ad996c175928643f981228b060117c24b79775d85" host="10.0.0.41" Jul 10 00:38:09.712135 env[1200]: 2025-07-10 00:38:09.694 [INFO][2893] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Jul 10 00:38:09.712135 env[1200]: 2025-07-10 00:38:09.694 [INFO][2893] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.46.132/26] IPv6=[] ContainerID="33ed43feb7cf73aa774e8a2ad996c175928643f981228b060117c24b79775d85" HandleID="k8s-pod-network.33ed43feb7cf73aa774e8a2ad996c175928643f981228b060117c24b79775d85" Workload="10.0.0.41-k8s-test--pod--1-eth0" Jul 10 00:38:09.712135 env[1200]: 2025-07-10 00:38:09.695 [INFO][2879] cni-plugin/k8s.go 418: Populated endpoint ContainerID="33ed43feb7cf73aa774e8a2ad996c175928643f981228b060117c24b79775d85" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.41-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.41-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"36aac103-c1b7-4ee0-945d-35c9673eab44", ResourceVersion:"1356", Generation:0, CreationTimestamp:time.Date(2025, time.July, 10, 0, 37, 53, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.41", ContainerID:"", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.46.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Jul 10 00:38:09.713122 env[1200]: 2025-07-10 00:38:09.695 [INFO][2879] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.46.132/32] ContainerID="33ed43feb7cf73aa774e8a2ad996c175928643f981228b060117c24b79775d85" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.41-k8s-test--pod--1-eth0" Jul 10 00:38:09.713122 env[1200]: 2025-07-10 00:38:09.696 [INFO][2879] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali5ec59c6bf6e ContainerID="33ed43feb7cf73aa774e8a2ad996c175928643f981228b060117c24b79775d85" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.41-k8s-test--pod--1-eth0" Jul 10 00:38:09.713122 env[1200]: 2025-07-10 00:38:09.701 [INFO][2879] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="33ed43feb7cf73aa774e8a2ad996c175928643f981228b060117c24b79775d85" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.41-k8s-test--pod--1-eth0" Jul 10 00:38:09.713122 env[1200]: 2025-07-10 00:38:09.702 [INFO][2879] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="33ed43feb7cf73aa774e8a2ad996c175928643f981228b060117c24b79775d85" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.41-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.41-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"36aac103-c1b7-4ee0-945d-35c9673eab44", ResourceVersion:"1356", Generation:0, CreationTimestamp:time.Date(2025, time.July, 10, 0, 37, 53, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.41", ContainerID:"33ed43feb7cf73aa774e8a2ad996c175928643f981228b060117c24b79775d85", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.46.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"f6:4e:f2:b1:0a:25", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Jul 10 00:38:09.713122 env[1200]: 2025-07-10 00:38:09.708 [INFO][2879] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="33ed43feb7cf73aa774e8a2ad996c175928643f981228b060117c24b79775d85" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.41-k8s-test--pod--1-eth0" Jul 10 00:38:09.722000 audit[2911]: NETFILTER_CFG table=filter:100 family=2 entries=40 op=nft_register_chain pid=2911 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 10 00:38:09.722000 audit[2911]: SYSCALL arch=c000003e syscall=46 success=yes exit=20336 a0=3 a1=7fff8ab4ffb0 a2=0 a3=7fff8ab4ff9c items=0 ppid=2102 pid=2911 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:38:09.722000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 10 00:38:09.727664 env[1200]: time="2025-07-10T00:38:09.727580410Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 10 00:38:09.727664 env[1200]: time="2025-07-10T00:38:09.727625935Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 10 00:38:09.728224 env[1200]: time="2025-07-10T00:38:09.727636976Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 10 00:38:09.728224 env[1200]: time="2025-07-10T00:38:09.727916923Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/33ed43feb7cf73aa774e8a2ad996c175928643f981228b060117c24b79775d85 pid=2919 runtime=io.containerd.runc.v2 Jul 10 00:38:09.739561 systemd[1]: Started cri-containerd-33ed43feb7cf73aa774e8a2ad996c175928643f981228b060117c24b79775d85.scope. Jul 10 00:38:09.753000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:38:09.753000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:38:09.753000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:38:09.753000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:38:09.753000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:38:09.753000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:38:09.753000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:38:09.753000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:38:09.753000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:38:09.754000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:38:09.754000 audit: BPF prog-id=129 op=LOAD Jul 10 00:38:09.754000 audit[2928]: AVC avc: denied { bpf } for pid=2928 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:38:09.754000 audit[2928]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2919 pid=2928 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:38:09.754000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3333656434336665623763663733616137373465386132616439393663 Jul 10 00:38:09.754000 audit[2928]: AVC avc: denied { perfmon } for pid=2928 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:38:09.754000 audit[2928]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=2919 pid=2928 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:38:09.754000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3333656434336665623763663733616137373465386132616439393663 Jul 10 00:38:09.754000 audit[2928]: AVC avc: denied { bpf } for pid=2928 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:38:09.754000 audit[2928]: AVC avc: denied { bpf } for pid=2928 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:38:09.754000 audit[2928]: AVC avc: denied { bpf } for pid=2928 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:38:09.754000 audit[2928]: AVC avc: denied { perfmon } for pid=2928 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:38:09.754000 audit[2928]: AVC avc: denied { perfmon } for pid=2928 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:38:09.754000 audit[2928]: AVC avc: denied { perfmon } for pid=2928 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:38:09.754000 audit[2928]: AVC avc: denied { perfmon } for pid=2928 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:38:09.754000 audit[2928]: AVC avc: denied { perfmon } for pid=2928 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:38:09.754000 audit[2928]: AVC avc: denied { bpf } for pid=2928 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:38:09.754000 audit[2928]: AVC avc: denied { bpf } for pid=2928 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:38:09.754000 audit: BPF prog-id=130 op=LOAD Jul 10 00:38:09.754000 audit[2928]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0001d9a40 items=0 ppid=2919 pid=2928 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:38:09.754000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3333656434336665623763663733616137373465386132616439393663 Jul 10 00:38:09.754000 audit[2928]: AVC avc: denied { bpf } for pid=2928 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:38:09.754000 audit[2928]: AVC avc: denied { bpf } for pid=2928 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:38:09.754000 audit[2928]: AVC avc: denied { perfmon } for pid=2928 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:38:09.754000 audit[2928]: AVC avc: denied { perfmon } for pid=2928 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:38:09.754000 audit[2928]: AVC avc: denied { perfmon } for pid=2928 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:38:09.754000 audit[2928]: AVC avc: denied { perfmon } for pid=2928 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:38:09.754000 audit[2928]: AVC avc: denied { perfmon } for pid=2928 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:38:09.754000 audit[2928]: AVC avc: denied { bpf } for pid=2928 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:38:09.754000 audit[2928]: AVC avc: denied { bpf } for pid=2928 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:38:09.754000 audit: BPF prog-id=131 op=LOAD Jul 10 00:38:09.754000 audit[2928]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0001d9a88 items=0 ppid=2919 pid=2928 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:38:09.754000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3333656434336665623763663733616137373465386132616439393663 Jul 10 00:38:09.754000 audit: BPF prog-id=131 op=UNLOAD Jul 10 00:38:09.754000 audit: BPF prog-id=130 op=UNLOAD Jul 10 00:38:09.754000 audit[2928]: AVC avc: denied { bpf } for pid=2928 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:38:09.754000 audit[2928]: AVC avc: denied { bpf } for pid=2928 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:38:09.754000 audit[2928]: AVC avc: denied { bpf } for pid=2928 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:38:09.754000 audit[2928]: AVC avc: denied { perfmon } for pid=2928 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:38:09.754000 audit[2928]: AVC avc: denied { perfmon } for pid=2928 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:38:09.754000 audit[2928]: AVC avc: denied { perfmon } for pid=2928 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:38:09.754000 audit[2928]: AVC avc: denied { perfmon } for pid=2928 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:38:09.754000 audit[2928]: AVC avc: denied { perfmon } for pid=2928 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:38:09.754000 audit[2928]: AVC avc: denied { bpf } for pid=2928 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:38:09.754000 audit[2928]: AVC avc: denied { bpf } for pid=2928 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:38:09.754000 audit: BPF prog-id=132 op=LOAD Jul 10 00:38:09.754000 audit[2928]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0001d9e98 items=0 ppid=2919 pid=2928 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:38:09.754000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3333656434336665623763663733616137373465386132616439393663 Jul 10 00:38:09.755902 systemd-resolved[1148]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Jul 10 00:38:09.784688 env[1200]: time="2025-07-10T00:38:09.784626109Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:36aac103-c1b7-4ee0-945d-35c9673eab44,Namespace:default,Attempt:0,} returns sandbox id \"33ed43feb7cf73aa774e8a2ad996c175928643f981228b060117c24b79775d85\"" Jul 10 00:38:09.785830 env[1200]: time="2025-07-10T00:38:09.785791373Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" Jul 10 00:38:10.221561 env[1200]: time="2025-07-10T00:38:10.221497138Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 10 00:38:10.223345 env[1200]: time="2025-07-10T00:38:10.223299581Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:f6422896ca84c9af48d5417d6b7a573bf6b38f81edc15538907d987fc658d909,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 10 00:38:10.225209 env[1200]: time="2025-07-10T00:38:10.225152430Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 10 00:38:10.226924 env[1200]: time="2025-07-10T00:38:10.226891974Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx@sha256:30bb68e656e0665bce700e67d2756f68bdca3345fa1099a32bfdb8febcf621cd,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 10 00:38:10.227471 env[1200]: time="2025-07-10T00:38:10.227447600Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:f6422896ca84c9af48d5417d6b7a573bf6b38f81edc15538907d987fc658d909\"" Jul 10 00:38:10.229570 env[1200]: time="2025-07-10T00:38:10.229525592Z" level=info msg="CreateContainer within sandbox \"33ed43feb7cf73aa774e8a2ad996c175928643f981228b060117c24b79775d85\" for container &ContainerMetadata{Name:test,Attempt:0,}" Jul 10 00:38:10.241618 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount186530104.mount: Deactivated successfully. Jul 10 00:38:10.243842 env[1200]: time="2025-07-10T00:38:10.243799293Z" level=info msg="CreateContainer within sandbox \"33ed43feb7cf73aa774e8a2ad996c175928643f981228b060117c24b79775d85\" for &ContainerMetadata{Name:test,Attempt:0,} returns container id \"f11c99e13fd7260008b2a3e5877a36bb327cbceb472ee45e3140b342429437c1\"" Jul 10 00:38:10.244309 env[1200]: time="2025-07-10T00:38:10.244284036Z" level=info msg="StartContainer for \"f11c99e13fd7260008b2a3e5877a36bb327cbceb472ee45e3140b342429437c1\"" Jul 10 00:38:10.259842 systemd[1]: Started cri-containerd-f11c99e13fd7260008b2a3e5877a36bb327cbceb472ee45e3140b342429437c1.scope. Jul 10 00:38:10.269077 kubelet[1438]: E0710 00:38:10.269036 1438 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 00:38:10.269000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:38:10.269000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:38:10.269000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:38:10.269000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:38:10.269000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:38:10.269000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:38:10.269000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:38:10.269000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:38:10.269000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:38:10.269000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:38:10.269000 audit: BPF prog-id=133 op=LOAD Jul 10 00:38:10.270000 audit[2958]: AVC avc: denied { bpf } for pid=2958 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:38:10.270000 audit[2958]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00013dc48 a2=10 a3=1c items=0 ppid=2919 pid=2958 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:38:10.270000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6631316339396531336664373236303030386232613365353837376133 Jul 10 00:38:10.270000 audit[2958]: AVC avc: denied { perfmon } for pid=2958 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:38:10.270000 audit[2958]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00013d6b0 a2=3c a3=8 items=0 ppid=2919 pid=2958 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:38:10.270000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6631316339396531336664373236303030386232613365353837376133 Jul 10 00:38:10.270000 audit[2958]: AVC avc: denied { bpf } for pid=2958 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:38:10.270000 audit[2958]: AVC avc: denied { bpf } for pid=2958 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:38:10.270000 audit[2958]: AVC avc: denied { bpf } for pid=2958 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:38:10.270000 audit[2958]: AVC avc: denied { perfmon } for pid=2958 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:38:10.270000 audit[2958]: AVC avc: denied { perfmon } for pid=2958 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:38:10.270000 audit[2958]: AVC avc: denied { perfmon } for pid=2958 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:38:10.270000 audit[2958]: AVC avc: denied { perfmon } for pid=2958 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:38:10.270000 audit[2958]: AVC avc: denied { perfmon } for pid=2958 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:38:10.270000 audit[2958]: AVC avc: denied { bpf } for pid=2958 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:38:10.270000 audit[2958]: AVC avc: denied { bpf } for pid=2958 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:38:10.270000 audit: BPF prog-id=134 op=LOAD Jul 10 00:38:10.270000 audit[2958]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00013d9d8 a2=78 a3=c000308eb0 items=0 ppid=2919 pid=2958 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:38:10.270000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6631316339396531336664373236303030386232613365353837376133 Jul 10 00:38:10.270000 audit[2958]: AVC avc: denied { bpf } for pid=2958 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:38:10.270000 audit[2958]: AVC avc: denied { bpf } for pid=2958 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:38:10.270000 audit[2958]: AVC avc: denied { perfmon } for pid=2958 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:38:10.270000 audit[2958]: AVC avc: denied { perfmon } for pid=2958 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:38:10.270000 audit[2958]: AVC avc: denied { perfmon } for pid=2958 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:38:10.270000 audit[2958]: AVC avc: denied { perfmon } for pid=2958 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:38:10.270000 audit[2958]: AVC avc: denied { perfmon } for pid=2958 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:38:10.270000 audit[2958]: AVC avc: denied { bpf } for pid=2958 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:38:10.270000 audit[2958]: AVC avc: denied { bpf } for pid=2958 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:38:10.270000 audit: BPF prog-id=135 op=LOAD Jul 10 00:38:10.270000 audit[2958]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00013d770 a2=78 a3=c000308ef8 items=0 ppid=2919 pid=2958 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:38:10.270000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6631316339396531336664373236303030386232613365353837376133 Jul 10 00:38:10.270000 audit: BPF prog-id=135 op=UNLOAD Jul 10 00:38:10.270000 audit: BPF prog-id=134 op=UNLOAD Jul 10 00:38:10.270000 audit[2958]: AVC avc: denied { bpf } for pid=2958 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:38:10.270000 audit[2958]: AVC avc: denied { bpf } for pid=2958 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:38:10.270000 audit[2958]: AVC avc: denied { bpf } for pid=2958 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:38:10.270000 audit[2958]: AVC avc: denied { perfmon } for pid=2958 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:38:10.270000 audit[2958]: AVC avc: denied { perfmon } for pid=2958 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:38:10.270000 audit[2958]: AVC avc: denied { perfmon } for pid=2958 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:38:10.270000 audit[2958]: AVC avc: denied { perfmon } for pid=2958 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:38:10.270000 audit[2958]: AVC avc: denied { perfmon } for pid=2958 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:38:10.270000 audit[2958]: AVC avc: denied { bpf } for pid=2958 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:38:10.270000 audit[2958]: AVC avc: denied { bpf } for pid=2958 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:38:10.270000 audit: BPF prog-id=136 op=LOAD Jul 10 00:38:10.270000 audit[2958]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00013dc30 a2=78 a3=c000309308 items=0 ppid=2919 pid=2958 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:38:10.270000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6631316339396531336664373236303030386232613365353837376133 Jul 10 00:38:10.284599 env[1200]: time="2025-07-10T00:38:10.284483865Z" level=info msg="StartContainer for \"f11c99e13fd7260008b2a3e5877a36bb327cbceb472ee45e3140b342429437c1\" returns successfully" Jul 10 00:38:10.783527 kubelet[1438]: I0710 00:38:10.783467 1438 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="default/test-pod-1" podStartSLOduration=17.340394766 podStartE2EDuration="17.78345112s" podCreationTimestamp="2025-07-10 00:37:53 +0000 UTC" firstStartedPulling="2025-07-10 00:38:09.785371111 +0000 UTC m=+57.213575323" lastFinishedPulling="2025-07-10 00:38:10.228427465 +0000 UTC m=+57.656631677" observedRunningTime="2025-07-10 00:38:10.783230424 +0000 UTC m=+58.211434636" watchObservedRunningTime="2025-07-10 00:38:10.78345112 +0000 UTC m=+58.211655322" Jul 10 00:38:11.056713 systemd-networkd[1022]: cali5ec59c6bf6e: Gained IPv6LL Jul 10 00:38:11.269728 kubelet[1438]: E0710 00:38:11.269659 1438 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 00:38:12.270717 kubelet[1438]: E0710 00:38:12.270656 1438 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 00:38:13.232951 kubelet[1438]: E0710 00:38:13.232882 1438 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 00:38:13.261811 env[1200]: time="2025-07-10T00:38:13.261753380Z" level=info msg="StopPodSandbox for \"36380709dfe2d8e250ffd502ca39a5316c83dda329c5a12e4d2d7efae44883db\"" Jul 10 00:38:13.271171 kubelet[1438]: E0710 00:38:13.271119 1438 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 00:38:13.319789 env[1200]: 2025-07-10 00:38:13.291 [WARNING][3019] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="36380709dfe2d8e250ffd502ca39a5316c83dda329c5a12e4d2d7efae44883db" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.41-k8s-csi--node--driver--76p48-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"f42a92fd-7908-4d38-9f25-e2008b563302", ResourceVersion:"1235", Generation:0, CreationTimestamp:time.Date(2025, time.July, 10, 0, 37, 14, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"8967bcb6f", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.41", ContainerID:"271a79e55682823dd6f248d02f1eace94171aff290f946c4d244581ea54b6cd2", Pod:"csi-node-driver-76p48", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.46.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali4bf9d35c545", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Jul 10 00:38:13.319789 env[1200]: 2025-07-10 00:38:13.291 [INFO][3019] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="36380709dfe2d8e250ffd502ca39a5316c83dda329c5a12e4d2d7efae44883db" Jul 10 00:38:13.319789 env[1200]: 2025-07-10 00:38:13.291 [INFO][3019] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="36380709dfe2d8e250ffd502ca39a5316c83dda329c5a12e4d2d7efae44883db" iface="eth0" netns="" Jul 10 00:38:13.319789 env[1200]: 2025-07-10 00:38:13.291 [INFO][3019] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="36380709dfe2d8e250ffd502ca39a5316c83dda329c5a12e4d2d7efae44883db" Jul 10 00:38:13.319789 env[1200]: 2025-07-10 00:38:13.291 [INFO][3019] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="36380709dfe2d8e250ffd502ca39a5316c83dda329c5a12e4d2d7efae44883db" Jul 10 00:38:13.319789 env[1200]: 2025-07-10 00:38:13.307 [INFO][3028] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="36380709dfe2d8e250ffd502ca39a5316c83dda329c5a12e4d2d7efae44883db" HandleID="k8s-pod-network.36380709dfe2d8e250ffd502ca39a5316c83dda329c5a12e4d2d7efae44883db" Workload="10.0.0.41-k8s-csi--node--driver--76p48-eth0" Jul 10 00:38:13.319789 env[1200]: 2025-07-10 00:38:13.307 [INFO][3028] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Jul 10 00:38:13.319789 env[1200]: 2025-07-10 00:38:13.307 [INFO][3028] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Jul 10 00:38:13.319789 env[1200]: 2025-07-10 00:38:13.315 [WARNING][3028] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="36380709dfe2d8e250ffd502ca39a5316c83dda329c5a12e4d2d7efae44883db" HandleID="k8s-pod-network.36380709dfe2d8e250ffd502ca39a5316c83dda329c5a12e4d2d7efae44883db" Workload="10.0.0.41-k8s-csi--node--driver--76p48-eth0" Jul 10 00:38:13.319789 env[1200]: 2025-07-10 00:38:13.315 [INFO][3028] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="36380709dfe2d8e250ffd502ca39a5316c83dda329c5a12e4d2d7efae44883db" HandleID="k8s-pod-network.36380709dfe2d8e250ffd502ca39a5316c83dda329c5a12e4d2d7efae44883db" Workload="10.0.0.41-k8s-csi--node--driver--76p48-eth0" Jul 10 00:38:13.319789 env[1200]: 2025-07-10 00:38:13.316 [INFO][3028] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Jul 10 00:38:13.319789 env[1200]: 2025-07-10 00:38:13.317 [INFO][3019] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="36380709dfe2d8e250ffd502ca39a5316c83dda329c5a12e4d2d7efae44883db" Jul 10 00:38:13.319789 env[1200]: time="2025-07-10T00:38:13.319806265Z" level=info msg="TearDown network for sandbox \"36380709dfe2d8e250ffd502ca39a5316c83dda329c5a12e4d2d7efae44883db\" successfully" Jul 10 00:38:13.319789 env[1200]: time="2025-07-10T00:38:13.319849045Z" level=info msg="StopPodSandbox for \"36380709dfe2d8e250ffd502ca39a5316c83dda329c5a12e4d2d7efae44883db\" returns successfully" Jul 10 00:38:13.320478 env[1200]: time="2025-07-10T00:38:13.320444556Z" level=info msg="RemovePodSandbox for \"36380709dfe2d8e250ffd502ca39a5316c83dda329c5a12e4d2d7efae44883db\"" Jul 10 00:38:13.320528 env[1200]: time="2025-07-10T00:38:13.320480203Z" level=info msg="Forcibly stopping sandbox \"36380709dfe2d8e250ffd502ca39a5316c83dda329c5a12e4d2d7efae44883db\"" Jul 10 00:38:13.380654 env[1200]: 2025-07-10 00:38:13.349 [WARNING][3046] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="36380709dfe2d8e250ffd502ca39a5316c83dda329c5a12e4d2d7efae44883db" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.41-k8s-csi--node--driver--76p48-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"f42a92fd-7908-4d38-9f25-e2008b563302", ResourceVersion:"1235", Generation:0, CreationTimestamp:time.Date(2025, time.July, 10, 0, 37, 14, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"8967bcb6f", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.41", ContainerID:"271a79e55682823dd6f248d02f1eace94171aff290f946c4d244581ea54b6cd2", Pod:"csi-node-driver-76p48", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.46.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali4bf9d35c545", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Jul 10 00:38:13.380654 env[1200]: 2025-07-10 00:38:13.349 [INFO][3046] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="36380709dfe2d8e250ffd502ca39a5316c83dda329c5a12e4d2d7efae44883db" Jul 10 00:38:13.380654 env[1200]: 2025-07-10 00:38:13.349 [INFO][3046] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="36380709dfe2d8e250ffd502ca39a5316c83dda329c5a12e4d2d7efae44883db" iface="eth0" netns="" Jul 10 00:38:13.380654 env[1200]: 2025-07-10 00:38:13.349 [INFO][3046] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="36380709dfe2d8e250ffd502ca39a5316c83dda329c5a12e4d2d7efae44883db" Jul 10 00:38:13.380654 env[1200]: 2025-07-10 00:38:13.349 [INFO][3046] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="36380709dfe2d8e250ffd502ca39a5316c83dda329c5a12e4d2d7efae44883db" Jul 10 00:38:13.380654 env[1200]: 2025-07-10 00:38:13.370 [INFO][3055] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="36380709dfe2d8e250ffd502ca39a5316c83dda329c5a12e4d2d7efae44883db" HandleID="k8s-pod-network.36380709dfe2d8e250ffd502ca39a5316c83dda329c5a12e4d2d7efae44883db" Workload="10.0.0.41-k8s-csi--node--driver--76p48-eth0" Jul 10 00:38:13.380654 env[1200]: 2025-07-10 00:38:13.370 [INFO][3055] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Jul 10 00:38:13.380654 env[1200]: 2025-07-10 00:38:13.370 [INFO][3055] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Jul 10 00:38:13.380654 env[1200]: 2025-07-10 00:38:13.376 [WARNING][3055] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="36380709dfe2d8e250ffd502ca39a5316c83dda329c5a12e4d2d7efae44883db" HandleID="k8s-pod-network.36380709dfe2d8e250ffd502ca39a5316c83dda329c5a12e4d2d7efae44883db" Workload="10.0.0.41-k8s-csi--node--driver--76p48-eth0" Jul 10 00:38:13.380654 env[1200]: 2025-07-10 00:38:13.376 [INFO][3055] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="36380709dfe2d8e250ffd502ca39a5316c83dda329c5a12e4d2d7efae44883db" HandleID="k8s-pod-network.36380709dfe2d8e250ffd502ca39a5316c83dda329c5a12e4d2d7efae44883db" Workload="10.0.0.41-k8s-csi--node--driver--76p48-eth0" Jul 10 00:38:13.380654 env[1200]: 2025-07-10 00:38:13.377 [INFO][3055] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Jul 10 00:38:13.380654 env[1200]: 2025-07-10 00:38:13.379 [INFO][3046] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="36380709dfe2d8e250ffd502ca39a5316c83dda329c5a12e4d2d7efae44883db" Jul 10 00:38:13.381332 env[1200]: time="2025-07-10T00:38:13.380683322Z" level=info msg="TearDown network for sandbox \"36380709dfe2d8e250ffd502ca39a5316c83dda329c5a12e4d2d7efae44883db\" successfully" Jul 10 00:38:13.385666 env[1200]: time="2025-07-10T00:38:13.385618667Z" level=info msg="RemovePodSandbox \"36380709dfe2d8e250ffd502ca39a5316c83dda329c5a12e4d2d7efae44883db\" returns successfully" Jul 10 00:38:13.386216 env[1200]: time="2025-07-10T00:38:13.386195983Z" level=info msg="StopPodSandbox for \"1fcb6fe1dbf10c3282c690abef16ec7281c5aea339fe6378e3f92bac9e19b611\"" Jul 10 00:38:13.457427 env[1200]: 2025-07-10 00:38:13.417 [WARNING][3073] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="1fcb6fe1dbf10c3282c690abef16ec7281c5aea339fe6378e3f92bac9e19b611" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.41-k8s-nginx--deployment--7fcdb87857--sr5g8-eth0", GenerateName:"nginx-deployment-7fcdb87857-", Namespace:"default", SelfLink:"", UID:"adb6abc2-1bb5-4ddf-8323-5dacb38a0c9b", ResourceVersion:"1248", Generation:0, CreationTimestamp:time.Date(2025, time.July, 10, 0, 37, 30, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"7fcdb87857", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.41", ContainerID:"79bcd3464abfb3491ed2da83b03bc1a41ae4cae0fc73c528badbd44b60484eb6", Pod:"nginx-deployment-7fcdb87857-sr5g8", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.46.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"calia9976f19339", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Jul 10 00:38:13.457427 env[1200]: 2025-07-10 00:38:13.417 [INFO][3073] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="1fcb6fe1dbf10c3282c690abef16ec7281c5aea339fe6378e3f92bac9e19b611" Jul 10 00:38:13.457427 env[1200]: 2025-07-10 00:38:13.417 [INFO][3073] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="1fcb6fe1dbf10c3282c690abef16ec7281c5aea339fe6378e3f92bac9e19b611" iface="eth0" netns="" Jul 10 00:38:13.457427 env[1200]: 2025-07-10 00:38:13.417 [INFO][3073] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="1fcb6fe1dbf10c3282c690abef16ec7281c5aea339fe6378e3f92bac9e19b611" Jul 10 00:38:13.457427 env[1200]: 2025-07-10 00:38:13.417 [INFO][3073] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="1fcb6fe1dbf10c3282c690abef16ec7281c5aea339fe6378e3f92bac9e19b611" Jul 10 00:38:13.457427 env[1200]: 2025-07-10 00:38:13.438 [INFO][3081] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="1fcb6fe1dbf10c3282c690abef16ec7281c5aea339fe6378e3f92bac9e19b611" HandleID="k8s-pod-network.1fcb6fe1dbf10c3282c690abef16ec7281c5aea339fe6378e3f92bac9e19b611" Workload="10.0.0.41-k8s-nginx--deployment--7fcdb87857--sr5g8-eth0" Jul 10 00:38:13.457427 env[1200]: 2025-07-10 00:38:13.438 [INFO][3081] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Jul 10 00:38:13.457427 env[1200]: 2025-07-10 00:38:13.438 [INFO][3081] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Jul 10 00:38:13.457427 env[1200]: 2025-07-10 00:38:13.452 [WARNING][3081] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="1fcb6fe1dbf10c3282c690abef16ec7281c5aea339fe6378e3f92bac9e19b611" HandleID="k8s-pod-network.1fcb6fe1dbf10c3282c690abef16ec7281c5aea339fe6378e3f92bac9e19b611" Workload="10.0.0.41-k8s-nginx--deployment--7fcdb87857--sr5g8-eth0" Jul 10 00:38:13.457427 env[1200]: 2025-07-10 00:38:13.452 [INFO][3081] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="1fcb6fe1dbf10c3282c690abef16ec7281c5aea339fe6378e3f92bac9e19b611" HandleID="k8s-pod-network.1fcb6fe1dbf10c3282c690abef16ec7281c5aea339fe6378e3f92bac9e19b611" Workload="10.0.0.41-k8s-nginx--deployment--7fcdb87857--sr5g8-eth0" Jul 10 00:38:13.457427 env[1200]: 2025-07-10 00:38:13.454 [INFO][3081] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Jul 10 00:38:13.457427 env[1200]: 2025-07-10 00:38:13.456 [INFO][3073] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="1fcb6fe1dbf10c3282c690abef16ec7281c5aea339fe6378e3f92bac9e19b611" Jul 10 00:38:13.458072 env[1200]: time="2025-07-10T00:38:13.457460272Z" level=info msg="TearDown network for sandbox \"1fcb6fe1dbf10c3282c690abef16ec7281c5aea339fe6378e3f92bac9e19b611\" successfully" Jul 10 00:38:13.458072 env[1200]: time="2025-07-10T00:38:13.457510065Z" level=info msg="StopPodSandbox for \"1fcb6fe1dbf10c3282c690abef16ec7281c5aea339fe6378e3f92bac9e19b611\" returns successfully" Jul 10 00:38:13.458157 env[1200]: time="2025-07-10T00:38:13.458067735Z" level=info msg="RemovePodSandbox for \"1fcb6fe1dbf10c3282c690abef16ec7281c5aea339fe6378e3f92bac9e19b611\"" Jul 10 00:38:13.458157 env[1200]: time="2025-07-10T00:38:13.458106588Z" level=info msg="Forcibly stopping sandbox \"1fcb6fe1dbf10c3282c690abef16ec7281c5aea339fe6378e3f92bac9e19b611\"" Jul 10 00:38:13.521534 env[1200]: 2025-07-10 00:38:13.491 [WARNING][3098] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="1fcb6fe1dbf10c3282c690abef16ec7281c5aea339fe6378e3f92bac9e19b611" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.41-k8s-nginx--deployment--7fcdb87857--sr5g8-eth0", GenerateName:"nginx-deployment-7fcdb87857-", Namespace:"default", SelfLink:"", UID:"adb6abc2-1bb5-4ddf-8323-5dacb38a0c9b", ResourceVersion:"1248", Generation:0, CreationTimestamp:time.Date(2025, time.July, 10, 0, 37, 30, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"7fcdb87857", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.41", ContainerID:"79bcd3464abfb3491ed2da83b03bc1a41ae4cae0fc73c528badbd44b60484eb6", Pod:"nginx-deployment-7fcdb87857-sr5g8", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.46.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"calia9976f19339", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Jul 10 00:38:13.521534 env[1200]: 2025-07-10 00:38:13.491 [INFO][3098] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="1fcb6fe1dbf10c3282c690abef16ec7281c5aea339fe6378e3f92bac9e19b611" Jul 10 00:38:13.521534 env[1200]: 2025-07-10 00:38:13.491 [INFO][3098] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="1fcb6fe1dbf10c3282c690abef16ec7281c5aea339fe6378e3f92bac9e19b611" iface="eth0" netns="" Jul 10 00:38:13.521534 env[1200]: 2025-07-10 00:38:13.492 [INFO][3098] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="1fcb6fe1dbf10c3282c690abef16ec7281c5aea339fe6378e3f92bac9e19b611" Jul 10 00:38:13.521534 env[1200]: 2025-07-10 00:38:13.492 [INFO][3098] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="1fcb6fe1dbf10c3282c690abef16ec7281c5aea339fe6378e3f92bac9e19b611" Jul 10 00:38:13.521534 env[1200]: 2025-07-10 00:38:13.510 [INFO][3108] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="1fcb6fe1dbf10c3282c690abef16ec7281c5aea339fe6378e3f92bac9e19b611" HandleID="k8s-pod-network.1fcb6fe1dbf10c3282c690abef16ec7281c5aea339fe6378e3f92bac9e19b611" Workload="10.0.0.41-k8s-nginx--deployment--7fcdb87857--sr5g8-eth0" Jul 10 00:38:13.521534 env[1200]: 2025-07-10 00:38:13.510 [INFO][3108] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Jul 10 00:38:13.521534 env[1200]: 2025-07-10 00:38:13.510 [INFO][3108] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Jul 10 00:38:13.521534 env[1200]: 2025-07-10 00:38:13.515 [WARNING][3108] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="1fcb6fe1dbf10c3282c690abef16ec7281c5aea339fe6378e3f92bac9e19b611" HandleID="k8s-pod-network.1fcb6fe1dbf10c3282c690abef16ec7281c5aea339fe6378e3f92bac9e19b611" Workload="10.0.0.41-k8s-nginx--deployment--7fcdb87857--sr5g8-eth0" Jul 10 00:38:13.521534 env[1200]: 2025-07-10 00:38:13.515 [INFO][3108] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="1fcb6fe1dbf10c3282c690abef16ec7281c5aea339fe6378e3f92bac9e19b611" HandleID="k8s-pod-network.1fcb6fe1dbf10c3282c690abef16ec7281c5aea339fe6378e3f92bac9e19b611" Workload="10.0.0.41-k8s-nginx--deployment--7fcdb87857--sr5g8-eth0" Jul 10 00:38:13.521534 env[1200]: 2025-07-10 00:38:13.518 [INFO][3108] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Jul 10 00:38:13.521534 env[1200]: 2025-07-10 00:38:13.520 [INFO][3098] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="1fcb6fe1dbf10c3282c690abef16ec7281c5aea339fe6378e3f92bac9e19b611" Jul 10 00:38:13.521534 env[1200]: time="2025-07-10T00:38:13.521441670Z" level=info msg="TearDown network for sandbox \"1fcb6fe1dbf10c3282c690abef16ec7281c5aea339fe6378e3f92bac9e19b611\" successfully" Jul 10 00:38:13.524863 env[1200]: time="2025-07-10T00:38:13.524813193Z" level=info msg="RemovePodSandbox \"1fcb6fe1dbf10c3282c690abef16ec7281c5aea339fe6378e3f92bac9e19b611\" returns successfully" Jul 10 00:38:14.271622 kubelet[1438]: E0710 00:38:14.271562 1438 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 00:38:15.272720 kubelet[1438]: E0710 00:38:15.272655 1438 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 00:38:16.273604 kubelet[1438]: E0710 00:38:16.273540 1438 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"