Jul 10 00:57:30.656307 kernel: Linux version 5.15.186-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Wed Jul 9 23:09:45 -00 2025 Jul 10 00:57:30.656325 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=vmware flatcar.autologin verity.usrhash=6cddad5f675165861f6062277cc28875548c735477e689762fc73abc16b63a3d Jul 10 00:57:30.656332 kernel: Disabled fast string operations Jul 10 00:57:30.656336 kernel: BIOS-provided physical RAM map: Jul 10 00:57:30.656340 kernel: BIOS-e820: [mem 0x0000000000000000-0x000000000009ebff] usable Jul 10 00:57:30.656345 kernel: BIOS-e820: [mem 0x000000000009ec00-0x000000000009ffff] reserved Jul 10 00:57:30.656354 kernel: BIOS-e820: [mem 0x00000000000dc000-0x00000000000fffff] reserved Jul 10 00:57:30.656361 kernel: BIOS-e820: [mem 0x0000000000100000-0x000000007fedffff] usable Jul 10 00:57:30.656368 kernel: BIOS-e820: [mem 0x000000007fee0000-0x000000007fefefff] ACPI data Jul 10 00:57:30.656375 kernel: BIOS-e820: [mem 0x000000007feff000-0x000000007fefffff] ACPI NVS Jul 10 00:57:30.656382 kernel: BIOS-e820: [mem 0x000000007ff00000-0x000000007fffffff] usable Jul 10 00:57:30.656389 kernel: BIOS-e820: [mem 0x00000000f0000000-0x00000000f7ffffff] reserved Jul 10 00:57:30.656396 kernel: BIOS-e820: [mem 0x00000000fec00000-0x00000000fec0ffff] reserved Jul 10 00:57:30.656403 kernel: BIOS-e820: [mem 0x00000000fee00000-0x00000000fee00fff] reserved Jul 10 00:57:30.656414 kernel: BIOS-e820: [mem 0x00000000fffe0000-0x00000000ffffffff] reserved Jul 10 00:57:30.656422 kernel: NX (Execute Disable) protection: active Jul 10 00:57:30.656429 kernel: SMBIOS 2.7 present. Jul 10 00:57:30.656435 kernel: DMI: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 05/28/2020 Jul 10 00:57:30.656439 kernel: vmware: hypercall mode: 0x00 Jul 10 00:57:30.656444 kernel: Hypervisor detected: VMware Jul 10 00:57:30.656450 kernel: vmware: TSC freq read from hypervisor : 3408.000 MHz Jul 10 00:57:30.660581 kernel: vmware: Host bus clock speed read from hypervisor : 66000000 Hz Jul 10 00:57:30.660595 kernel: vmware: using clock offset of 7630038085 ns Jul 10 00:57:30.660600 kernel: tsc: Detected 3408.000 MHz processor Jul 10 00:57:30.660606 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved Jul 10 00:57:30.660611 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable Jul 10 00:57:30.660616 kernel: last_pfn = 0x80000 max_arch_pfn = 0x400000000 Jul 10 00:57:30.660620 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT Jul 10 00:57:30.660625 kernel: total RAM covered: 3072M Jul 10 00:57:30.660632 kernel: Found optimal setting for mtrr clean up Jul 10 00:57:30.660638 kernel: gran_size: 64K chunk_size: 64K num_reg: 2 lose cover RAM: 0G Jul 10 00:57:30.660643 kernel: Using GB pages for direct mapping Jul 10 00:57:30.660647 kernel: ACPI: Early table checksum verification disabled Jul 10 00:57:30.660652 kernel: ACPI: RSDP 0x00000000000F6A00 000024 (v02 PTLTD ) Jul 10 00:57:30.660657 kernel: ACPI: XSDT 0x000000007FEE965B 00005C (v01 INTEL 440BX 06040000 VMW 01324272) Jul 10 00:57:30.660662 kernel: ACPI: FACP 0x000000007FEFEE73 0000F4 (v04 INTEL 440BX 06040000 PTL 000F4240) Jul 10 00:57:30.660671 kernel: ACPI: DSDT 0x000000007FEEAD55 01411E (v01 PTLTD Custom 06040000 MSFT 03000001) Jul 10 00:57:30.660676 kernel: ACPI: FACS 0x000000007FEFFFC0 000040 Jul 10 00:57:30.660680 kernel: ACPI: FACS 0x000000007FEFFFC0 000040 Jul 10 00:57:30.660687 kernel: ACPI: BOOT 0x000000007FEEAD2D 000028 (v01 PTLTD $SBFTBL$ 06040000 LTP 00000001) Jul 10 00:57:30.660693 kernel: ACPI: APIC 0x000000007FEEA5EB 000742 (v01 PTLTD ? APIC 06040000 LTP 00000000) Jul 10 00:57:30.660698 kernel: ACPI: MCFG 0x000000007FEEA5AF 00003C (v01 PTLTD $PCITBL$ 06040000 LTP 00000001) Jul 10 00:57:30.660703 kernel: ACPI: SRAT 0x000000007FEE9757 0008A8 (v02 VMWARE MEMPLUG 06040000 VMW 00000001) Jul 10 00:57:30.660708 kernel: ACPI: HPET 0x000000007FEE971F 000038 (v01 VMWARE VMW HPET 06040000 VMW 00000001) Jul 10 00:57:30.660714 kernel: ACPI: WAET 0x000000007FEE96F7 000028 (v01 VMWARE VMW WAET 06040000 VMW 00000001) Jul 10 00:57:30.660719 kernel: ACPI: Reserving FACP table memory at [mem 0x7fefee73-0x7fefef66] Jul 10 00:57:30.660724 kernel: ACPI: Reserving DSDT table memory at [mem 0x7feead55-0x7fefee72] Jul 10 00:57:30.660729 kernel: ACPI: Reserving FACS table memory at [mem 0x7fefffc0-0x7fefffff] Jul 10 00:57:30.660741 kernel: ACPI: Reserving FACS table memory at [mem 0x7fefffc0-0x7fefffff] Jul 10 00:57:30.660746 kernel: ACPI: Reserving BOOT table memory at [mem 0x7feead2d-0x7feead54] Jul 10 00:57:30.660751 kernel: ACPI: Reserving APIC table memory at [mem 0x7feea5eb-0x7feead2c] Jul 10 00:57:30.660756 kernel: ACPI: Reserving MCFG table memory at [mem 0x7feea5af-0x7feea5ea] Jul 10 00:57:30.660761 kernel: ACPI: Reserving SRAT table memory at [mem 0x7fee9757-0x7fee9ffe] Jul 10 00:57:30.660768 kernel: ACPI: Reserving HPET table memory at [mem 0x7fee971f-0x7fee9756] Jul 10 00:57:30.660773 kernel: ACPI: Reserving WAET table memory at [mem 0x7fee96f7-0x7fee971e] Jul 10 00:57:30.660778 kernel: system APIC only can use physical flat Jul 10 00:57:30.660784 kernel: Setting APIC routing to physical flat. Jul 10 00:57:30.660791 kernel: SRAT: PXM 0 -> APIC 0x00 -> Node 0 Jul 10 00:57:30.660796 kernel: SRAT: PXM 0 -> APIC 0x02 -> Node 0 Jul 10 00:57:30.660801 kernel: SRAT: PXM 0 -> APIC 0x04 -> Node 0 Jul 10 00:57:30.660806 kernel: SRAT: PXM 0 -> APIC 0x06 -> Node 0 Jul 10 00:57:30.660811 kernel: SRAT: PXM 0 -> APIC 0x08 -> Node 0 Jul 10 00:57:30.660817 kernel: SRAT: PXM 0 -> APIC 0x0a -> Node 0 Jul 10 00:57:30.660822 kernel: SRAT: PXM 0 -> APIC 0x0c -> Node 0 Jul 10 00:57:30.660827 kernel: SRAT: PXM 0 -> APIC 0x0e -> Node 0 Jul 10 00:57:30.660831 kernel: SRAT: PXM 0 -> APIC 0x10 -> Node 0 Jul 10 00:57:30.660836 kernel: SRAT: PXM 0 -> APIC 0x12 -> Node 0 Jul 10 00:57:30.660841 kernel: SRAT: PXM 0 -> APIC 0x14 -> Node 0 Jul 10 00:57:30.660846 kernel: SRAT: PXM 0 -> APIC 0x16 -> Node 0 Jul 10 00:57:30.660851 kernel: SRAT: PXM 0 -> APIC 0x18 -> Node 0 Jul 10 00:57:30.660856 kernel: SRAT: PXM 0 -> APIC 0x1a -> Node 0 Jul 10 00:57:30.660861 kernel: SRAT: PXM 0 -> APIC 0x1c -> Node 0 Jul 10 00:57:30.660866 kernel: SRAT: PXM 0 -> APIC 0x1e -> Node 0 Jul 10 00:57:30.660871 kernel: SRAT: PXM 0 -> APIC 0x20 -> Node 0 Jul 10 00:57:30.660876 kernel: SRAT: PXM 0 -> APIC 0x22 -> Node 0 Jul 10 00:57:30.660881 kernel: SRAT: PXM 0 -> APIC 0x24 -> Node 0 Jul 10 00:57:30.660886 kernel: SRAT: PXM 0 -> APIC 0x26 -> Node 0 Jul 10 00:57:30.660891 kernel: SRAT: PXM 0 -> APIC 0x28 -> Node 0 Jul 10 00:57:30.660896 kernel: SRAT: PXM 0 -> APIC 0x2a -> Node 0 Jul 10 00:57:30.660901 kernel: SRAT: PXM 0 -> APIC 0x2c -> Node 0 Jul 10 00:57:30.660905 kernel: SRAT: PXM 0 -> APIC 0x2e -> Node 0 Jul 10 00:57:30.660910 kernel: SRAT: PXM 0 -> APIC 0x30 -> Node 0 Jul 10 00:57:30.660916 kernel: SRAT: PXM 0 -> APIC 0x32 -> Node 0 Jul 10 00:57:30.660921 kernel: SRAT: PXM 0 -> APIC 0x34 -> Node 0 Jul 10 00:57:30.660926 kernel: SRAT: PXM 0 -> APIC 0x36 -> Node 0 Jul 10 00:57:30.660930 kernel: SRAT: PXM 0 -> APIC 0x38 -> Node 0 Jul 10 00:57:30.660935 kernel: SRAT: PXM 0 -> APIC 0x3a -> Node 0 Jul 10 00:57:30.660940 kernel: SRAT: PXM 0 -> APIC 0x3c -> Node 0 Jul 10 00:57:30.660945 kernel: SRAT: PXM 0 -> APIC 0x3e -> Node 0 Jul 10 00:57:30.660950 kernel: SRAT: PXM 0 -> APIC 0x40 -> Node 0 Jul 10 00:57:30.660954 kernel: SRAT: PXM 0 -> APIC 0x42 -> Node 0 Jul 10 00:57:30.660960 kernel: SRAT: PXM 0 -> APIC 0x44 -> Node 0 Jul 10 00:57:30.660965 kernel: SRAT: PXM 0 -> APIC 0x46 -> Node 0 Jul 10 00:57:30.660971 kernel: SRAT: PXM 0 -> APIC 0x48 -> Node 0 Jul 10 00:57:30.660978 kernel: SRAT: PXM 0 -> APIC 0x4a -> Node 0 Jul 10 00:57:30.660983 kernel: SRAT: PXM 0 -> APIC 0x4c -> Node 0 Jul 10 00:57:30.660988 kernel: SRAT: PXM 0 -> APIC 0x4e -> Node 0 Jul 10 00:57:30.660993 kernel: SRAT: PXM 0 -> APIC 0x50 -> Node 0 Jul 10 00:57:30.660998 kernel: SRAT: PXM 0 -> APIC 0x52 -> Node 0 Jul 10 00:57:30.661003 kernel: SRAT: PXM 0 -> APIC 0x54 -> Node 0 Jul 10 00:57:30.661007 kernel: SRAT: PXM 0 -> APIC 0x56 -> Node 0 Jul 10 00:57:30.661014 kernel: SRAT: PXM 0 -> APIC 0x58 -> Node 0 Jul 10 00:57:30.661018 kernel: SRAT: PXM 0 -> APIC 0x5a -> Node 0 Jul 10 00:57:30.661023 kernel: SRAT: PXM 0 -> APIC 0x5c -> Node 0 Jul 10 00:57:30.661028 kernel: SRAT: PXM 0 -> APIC 0x5e -> Node 0 Jul 10 00:57:30.661033 kernel: SRAT: PXM 0 -> APIC 0x60 -> Node 0 Jul 10 00:57:30.661038 kernel: SRAT: PXM 0 -> APIC 0x62 -> Node 0 Jul 10 00:57:30.661043 kernel: SRAT: PXM 0 -> APIC 0x64 -> Node 0 Jul 10 00:57:30.661048 kernel: SRAT: PXM 0 -> APIC 0x66 -> Node 0 Jul 10 00:57:30.661052 kernel: SRAT: PXM 0 -> APIC 0x68 -> Node 0 Jul 10 00:57:30.661057 kernel: SRAT: PXM 0 -> APIC 0x6a -> Node 0 Jul 10 00:57:30.661063 kernel: SRAT: PXM 0 -> APIC 0x6c -> Node 0 Jul 10 00:57:30.661068 kernel: SRAT: PXM 0 -> APIC 0x6e -> Node 0 Jul 10 00:57:30.661073 kernel: SRAT: PXM 0 -> APIC 0x70 -> Node 0 Jul 10 00:57:30.661078 kernel: SRAT: PXM 0 -> APIC 0x72 -> Node 0 Jul 10 00:57:30.661083 kernel: SRAT: PXM 0 -> APIC 0x74 -> Node 0 Jul 10 00:57:30.661088 kernel: SRAT: PXM 0 -> APIC 0x76 -> Node 0 Jul 10 00:57:30.661094 kernel: SRAT: PXM 0 -> APIC 0x78 -> Node 0 Jul 10 00:57:30.661102 kernel: SRAT: PXM 0 -> APIC 0x7a -> Node 0 Jul 10 00:57:30.661108 kernel: SRAT: PXM 0 -> APIC 0x7c -> Node 0 Jul 10 00:57:30.661113 kernel: SRAT: PXM 0 -> APIC 0x7e -> Node 0 Jul 10 00:57:30.661119 kernel: SRAT: PXM 0 -> APIC 0x80 -> Node 0 Jul 10 00:57:30.661125 kernel: SRAT: PXM 0 -> APIC 0x82 -> Node 0 Jul 10 00:57:30.661130 kernel: SRAT: PXM 0 -> APIC 0x84 -> Node 0 Jul 10 00:57:30.661135 kernel: SRAT: PXM 0 -> APIC 0x86 -> Node 0 Jul 10 00:57:30.661141 kernel: SRAT: PXM 0 -> APIC 0x88 -> Node 0 Jul 10 00:57:30.661146 kernel: SRAT: PXM 0 -> APIC 0x8a -> Node 0 Jul 10 00:57:30.661151 kernel: SRAT: PXM 0 -> APIC 0x8c -> Node 0 Jul 10 00:57:30.661156 kernel: SRAT: PXM 0 -> APIC 0x8e -> Node 0 Jul 10 00:57:30.661163 kernel: SRAT: PXM 0 -> APIC 0x90 -> Node 0 Jul 10 00:57:30.661168 kernel: SRAT: PXM 0 -> APIC 0x92 -> Node 0 Jul 10 00:57:30.661173 kernel: SRAT: PXM 0 -> APIC 0x94 -> Node 0 Jul 10 00:57:30.661178 kernel: SRAT: PXM 0 -> APIC 0x96 -> Node 0 Jul 10 00:57:30.661183 kernel: SRAT: PXM 0 -> APIC 0x98 -> Node 0 Jul 10 00:57:30.661189 kernel: SRAT: PXM 0 -> APIC 0x9a -> Node 0 Jul 10 00:57:30.661194 kernel: SRAT: PXM 0 -> APIC 0x9c -> Node 0 Jul 10 00:57:30.661201 kernel: SRAT: PXM 0 -> APIC 0x9e -> Node 0 Jul 10 00:57:30.661207 kernel: SRAT: PXM 0 -> APIC 0xa0 -> Node 0 Jul 10 00:57:30.661213 kernel: SRAT: PXM 0 -> APIC 0xa2 -> Node 0 Jul 10 00:57:30.661219 kernel: SRAT: PXM 0 -> APIC 0xa4 -> Node 0 Jul 10 00:57:30.661224 kernel: SRAT: PXM 0 -> APIC 0xa6 -> Node 0 Jul 10 00:57:30.661229 kernel: SRAT: PXM 0 -> APIC 0xa8 -> Node 0 Jul 10 00:57:30.661234 kernel: SRAT: PXM 0 -> APIC 0xaa -> Node 0 Jul 10 00:57:30.661239 kernel: SRAT: PXM 0 -> APIC 0xac -> Node 0 Jul 10 00:57:30.661244 kernel: SRAT: PXM 0 -> APIC 0xae -> Node 0 Jul 10 00:57:30.661250 kernel: SRAT: PXM 0 -> APIC 0xb0 -> Node 0 Jul 10 00:57:30.661255 kernel: SRAT: PXM 0 -> APIC 0xb2 -> Node 0 Jul 10 00:57:30.661260 kernel: SRAT: PXM 0 -> APIC 0xb4 -> Node 0 Jul 10 00:57:30.661265 kernel: SRAT: PXM 0 -> APIC 0xb6 -> Node 0 Jul 10 00:57:30.661272 kernel: SRAT: PXM 0 -> APIC 0xb8 -> Node 0 Jul 10 00:57:30.661277 kernel: SRAT: PXM 0 -> APIC 0xba -> Node 0 Jul 10 00:57:30.661282 kernel: SRAT: PXM 0 -> APIC 0xbc -> Node 0 Jul 10 00:57:30.661287 kernel: SRAT: PXM 0 -> APIC 0xbe -> Node 0 Jul 10 00:57:30.661292 kernel: SRAT: PXM 0 -> APIC 0xc0 -> Node 0 Jul 10 00:57:30.661298 kernel: SRAT: PXM 0 -> APIC 0xc2 -> Node 0 Jul 10 00:57:30.661303 kernel: SRAT: PXM 0 -> APIC 0xc4 -> Node 0 Jul 10 00:57:30.661308 kernel: SRAT: PXM 0 -> APIC 0xc6 -> Node 0 Jul 10 00:57:30.661313 kernel: SRAT: PXM 0 -> APIC 0xc8 -> Node 0 Jul 10 00:57:30.661318 kernel: SRAT: PXM 0 -> APIC 0xca -> Node 0 Jul 10 00:57:30.661325 kernel: SRAT: PXM 0 -> APIC 0xcc -> Node 0 Jul 10 00:57:30.661330 kernel: SRAT: PXM 0 -> APIC 0xce -> Node 0 Jul 10 00:57:30.661335 kernel: SRAT: PXM 0 -> APIC 0xd0 -> Node 0 Jul 10 00:57:30.661340 kernel: SRAT: PXM 0 -> APIC 0xd2 -> Node 0 Jul 10 00:57:30.661345 kernel: SRAT: PXM 0 -> APIC 0xd4 -> Node 0 Jul 10 00:57:30.661351 kernel: SRAT: PXM 0 -> APIC 0xd6 -> Node 0 Jul 10 00:57:30.661356 kernel: SRAT: PXM 0 -> APIC 0xd8 -> Node 0 Jul 10 00:57:30.661361 kernel: SRAT: PXM 0 -> APIC 0xda -> Node 0 Jul 10 00:57:30.661366 kernel: SRAT: PXM 0 -> APIC 0xdc -> Node 0 Jul 10 00:57:30.661372 kernel: SRAT: PXM 0 -> APIC 0xde -> Node 0 Jul 10 00:57:30.661377 kernel: SRAT: PXM 0 -> APIC 0xe0 -> Node 0 Jul 10 00:57:30.661382 kernel: SRAT: PXM 0 -> APIC 0xe2 -> Node 0 Jul 10 00:57:30.661387 kernel: SRAT: PXM 0 -> APIC 0xe4 -> Node 0 Jul 10 00:57:30.661393 kernel: SRAT: PXM 0 -> APIC 0xe6 -> Node 0 Jul 10 00:57:30.661400 kernel: SRAT: PXM 0 -> APIC 0xe8 -> Node 0 Jul 10 00:57:30.661406 kernel: SRAT: PXM 0 -> APIC 0xea -> Node 0 Jul 10 00:57:30.661411 kernel: SRAT: PXM 0 -> APIC 0xec -> Node 0 Jul 10 00:57:30.661416 kernel: SRAT: PXM 0 -> APIC 0xee -> Node 0 Jul 10 00:57:30.661422 kernel: SRAT: PXM 0 -> APIC 0xf0 -> Node 0 Jul 10 00:57:30.661428 kernel: SRAT: PXM 0 -> APIC 0xf2 -> Node 0 Jul 10 00:57:30.661433 kernel: SRAT: PXM 0 -> APIC 0xf4 -> Node 0 Jul 10 00:57:30.661439 kernel: SRAT: PXM 0 -> APIC 0xf6 -> Node 0 Jul 10 00:57:30.661444 kernel: SRAT: PXM 0 -> APIC 0xf8 -> Node 0 Jul 10 00:57:30.661449 kernel: SRAT: PXM 0 -> APIC 0xfa -> Node 0 Jul 10 00:57:30.661454 kernel: SRAT: PXM 0 -> APIC 0xfc -> Node 0 Jul 10 00:57:30.661459 kernel: SRAT: PXM 0 -> APIC 0xfe -> Node 0 Jul 10 00:57:30.661465 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x00000000-0x0009ffff] Jul 10 00:57:30.661470 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x00100000-0x7fffffff] Jul 10 00:57:30.661476 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x80000000-0xbfffffff] hotplug Jul 10 00:57:30.661482 kernel: NUMA: Node 0 [mem 0x00000000-0x0009ffff] + [mem 0x00100000-0x7fffffff] -> [mem 0x00000000-0x7fffffff] Jul 10 00:57:30.661488 kernel: NODE_DATA(0) allocated [mem 0x7fffa000-0x7fffffff] Jul 10 00:57:30.661493 kernel: Zone ranges: Jul 10 00:57:30.661499 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] Jul 10 00:57:30.661504 kernel: DMA32 [mem 0x0000000001000000-0x000000007fffffff] Jul 10 00:57:30.661509 kernel: Normal empty Jul 10 00:57:30.661514 kernel: Movable zone start for each node Jul 10 00:57:30.661520 kernel: Early memory node ranges Jul 10 00:57:30.661525 kernel: node 0: [mem 0x0000000000001000-0x000000000009dfff] Jul 10 00:57:30.661535 kernel: node 0: [mem 0x0000000000100000-0x000000007fedffff] Jul 10 00:57:30.661543 kernel: node 0: [mem 0x000000007ff00000-0x000000007fffffff] Jul 10 00:57:30.661549 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000007fffffff] Jul 10 00:57:30.661554 kernel: On node 0, zone DMA: 1 pages in unavailable ranges Jul 10 00:57:30.661562 kernel: On node 0, zone DMA: 98 pages in unavailable ranges Jul 10 00:57:30.661570 kernel: On node 0, zone DMA32: 32 pages in unavailable ranges Jul 10 00:57:30.661575 kernel: ACPI: PM-Timer IO Port: 0x1008 Jul 10 00:57:30.661580 kernel: system APIC only can use physical flat Jul 10 00:57:30.661587 kernel: ACPI: LAPIC_NMI (acpi_id[0x00] high edge lint[0x1]) Jul 10 00:57:30.661595 kernel: ACPI: LAPIC_NMI (acpi_id[0x01] high edge lint[0x1]) Jul 10 00:57:30.661600 kernel: ACPI: LAPIC_NMI (acpi_id[0x02] high edge lint[0x1]) Jul 10 00:57:30.661606 kernel: ACPI: LAPIC_NMI (acpi_id[0x03] high edge lint[0x1]) Jul 10 00:57:30.661611 kernel: ACPI: LAPIC_NMI (acpi_id[0x04] high edge lint[0x1]) Jul 10 00:57:30.661616 kernel: ACPI: LAPIC_NMI (acpi_id[0x05] high edge lint[0x1]) Jul 10 00:57:30.661625 kernel: ACPI: LAPIC_NMI (acpi_id[0x06] high edge lint[0x1]) Jul 10 00:57:30.661633 kernel: ACPI: LAPIC_NMI (acpi_id[0x07] high edge lint[0x1]) Jul 10 00:57:30.661640 kernel: ACPI: LAPIC_NMI (acpi_id[0x08] high edge lint[0x1]) Jul 10 00:57:30.661645 kernel: ACPI: LAPIC_NMI (acpi_id[0x09] high edge lint[0x1]) Jul 10 00:57:30.661650 kernel: ACPI: LAPIC_NMI (acpi_id[0x0a] high edge lint[0x1]) Jul 10 00:57:30.661660 kernel: ACPI: LAPIC_NMI (acpi_id[0x0b] high edge lint[0x1]) Jul 10 00:57:30.661666 kernel: ACPI: LAPIC_NMI (acpi_id[0x0c] high edge lint[0x1]) Jul 10 00:57:30.661671 kernel: ACPI: LAPIC_NMI (acpi_id[0x0d] high edge lint[0x1]) Jul 10 00:57:30.661676 kernel: ACPI: LAPIC_NMI (acpi_id[0x0e] high edge lint[0x1]) Jul 10 00:57:30.661681 kernel: ACPI: LAPIC_NMI (acpi_id[0x0f] high edge lint[0x1]) Jul 10 00:57:30.661686 kernel: ACPI: LAPIC_NMI (acpi_id[0x10] high edge lint[0x1]) Jul 10 00:57:30.661692 kernel: ACPI: LAPIC_NMI (acpi_id[0x11] high edge lint[0x1]) Jul 10 00:57:30.661697 kernel: ACPI: LAPIC_NMI (acpi_id[0x12] high edge lint[0x1]) Jul 10 00:57:30.661702 kernel: ACPI: LAPIC_NMI (acpi_id[0x13] high edge lint[0x1]) Jul 10 00:57:30.661709 kernel: ACPI: LAPIC_NMI (acpi_id[0x14] high edge lint[0x1]) Jul 10 00:57:30.661714 kernel: ACPI: LAPIC_NMI (acpi_id[0x15] high edge lint[0x1]) Jul 10 00:57:30.661720 kernel: ACPI: LAPIC_NMI (acpi_id[0x16] high edge lint[0x1]) Jul 10 00:57:30.661727 kernel: ACPI: LAPIC_NMI (acpi_id[0x17] high edge lint[0x1]) Jul 10 00:57:30.662744 kernel: ACPI: LAPIC_NMI (acpi_id[0x18] high edge lint[0x1]) Jul 10 00:57:30.662756 kernel: ACPI: LAPIC_NMI (acpi_id[0x19] high edge lint[0x1]) Jul 10 00:57:30.662761 kernel: ACPI: LAPIC_NMI (acpi_id[0x1a] high edge lint[0x1]) Jul 10 00:57:30.662767 kernel: ACPI: LAPIC_NMI (acpi_id[0x1b] high edge lint[0x1]) Jul 10 00:57:30.662772 kernel: ACPI: LAPIC_NMI (acpi_id[0x1c] high edge lint[0x1]) Jul 10 00:57:30.662780 kernel: ACPI: LAPIC_NMI (acpi_id[0x1d] high edge lint[0x1]) Jul 10 00:57:30.662785 kernel: ACPI: LAPIC_NMI (acpi_id[0x1e] high edge lint[0x1]) Jul 10 00:57:30.662791 kernel: ACPI: LAPIC_NMI (acpi_id[0x1f] high edge lint[0x1]) Jul 10 00:57:30.662796 kernel: ACPI: LAPIC_NMI (acpi_id[0x20] high edge lint[0x1]) Jul 10 00:57:30.662801 kernel: ACPI: LAPIC_NMI (acpi_id[0x21] high edge lint[0x1]) Jul 10 00:57:30.662806 kernel: ACPI: LAPIC_NMI (acpi_id[0x22] high edge lint[0x1]) Jul 10 00:57:30.662811 kernel: ACPI: LAPIC_NMI (acpi_id[0x23] high edge lint[0x1]) Jul 10 00:57:30.662817 kernel: ACPI: LAPIC_NMI (acpi_id[0x24] high edge lint[0x1]) Jul 10 00:57:30.662822 kernel: ACPI: LAPIC_NMI (acpi_id[0x25] high edge lint[0x1]) Jul 10 00:57:30.662830 kernel: ACPI: LAPIC_NMI (acpi_id[0x26] high edge lint[0x1]) Jul 10 00:57:30.662837 kernel: ACPI: LAPIC_NMI (acpi_id[0x27] high edge lint[0x1]) Jul 10 00:57:30.662842 kernel: ACPI: LAPIC_NMI (acpi_id[0x28] high edge lint[0x1]) Jul 10 00:57:30.662848 kernel: ACPI: LAPIC_NMI (acpi_id[0x29] high edge lint[0x1]) Jul 10 00:57:30.662853 kernel: ACPI: LAPIC_NMI (acpi_id[0x2a] high edge lint[0x1]) Jul 10 00:57:30.662858 kernel: ACPI: LAPIC_NMI (acpi_id[0x2b] high edge lint[0x1]) Jul 10 00:57:30.662864 kernel: ACPI: LAPIC_NMI (acpi_id[0x2c] high edge lint[0x1]) Jul 10 00:57:30.662869 kernel: ACPI: LAPIC_NMI (acpi_id[0x2d] high edge lint[0x1]) Jul 10 00:57:30.662874 kernel: ACPI: LAPIC_NMI (acpi_id[0x2e] high edge lint[0x1]) Jul 10 00:57:30.662879 kernel: ACPI: LAPIC_NMI (acpi_id[0x2f] high edge lint[0x1]) Jul 10 00:57:30.662886 kernel: ACPI: LAPIC_NMI (acpi_id[0x30] high edge lint[0x1]) Jul 10 00:57:30.662891 kernel: ACPI: LAPIC_NMI (acpi_id[0x31] high edge lint[0x1]) Jul 10 00:57:30.662896 kernel: ACPI: LAPIC_NMI (acpi_id[0x32] high edge lint[0x1]) Jul 10 00:57:30.662902 kernel: ACPI: LAPIC_NMI (acpi_id[0x33] high edge lint[0x1]) Jul 10 00:57:30.662907 kernel: ACPI: LAPIC_NMI (acpi_id[0x34] high edge lint[0x1]) Jul 10 00:57:30.662912 kernel: ACPI: LAPIC_NMI (acpi_id[0x35] high edge lint[0x1]) Jul 10 00:57:30.662917 kernel: ACPI: LAPIC_NMI (acpi_id[0x36] high edge lint[0x1]) Jul 10 00:57:30.662923 kernel: ACPI: LAPIC_NMI (acpi_id[0x37] high edge lint[0x1]) Jul 10 00:57:30.662928 kernel: ACPI: LAPIC_NMI (acpi_id[0x38] high edge lint[0x1]) Jul 10 00:57:30.662934 kernel: ACPI: LAPIC_NMI (acpi_id[0x39] high edge lint[0x1]) Jul 10 00:57:30.662939 kernel: ACPI: LAPIC_NMI (acpi_id[0x3a] high edge lint[0x1]) Jul 10 00:57:30.662945 kernel: ACPI: LAPIC_NMI (acpi_id[0x3b] high edge lint[0x1]) Jul 10 00:57:30.662950 kernel: ACPI: LAPIC_NMI (acpi_id[0x3c] high edge lint[0x1]) Jul 10 00:57:30.662955 kernel: ACPI: LAPIC_NMI (acpi_id[0x3d] high edge lint[0x1]) Jul 10 00:57:30.662960 kernel: ACPI: LAPIC_NMI (acpi_id[0x3e] high edge lint[0x1]) Jul 10 00:57:30.662966 kernel: ACPI: LAPIC_NMI (acpi_id[0x3f] high edge lint[0x1]) Jul 10 00:57:30.662971 kernel: ACPI: LAPIC_NMI (acpi_id[0x40] high edge lint[0x1]) Jul 10 00:57:30.662976 kernel: ACPI: LAPIC_NMI (acpi_id[0x41] high edge lint[0x1]) Jul 10 00:57:30.662981 kernel: ACPI: LAPIC_NMI (acpi_id[0x42] high edge lint[0x1]) Jul 10 00:57:30.662987 kernel: ACPI: LAPIC_NMI (acpi_id[0x43] high edge lint[0x1]) Jul 10 00:57:30.662993 kernel: ACPI: LAPIC_NMI (acpi_id[0x44] high edge lint[0x1]) Jul 10 00:57:30.662998 kernel: ACPI: LAPIC_NMI (acpi_id[0x45] high edge lint[0x1]) Jul 10 00:57:30.663003 kernel: ACPI: LAPIC_NMI (acpi_id[0x46] high edge lint[0x1]) Jul 10 00:57:30.663008 kernel: ACPI: LAPIC_NMI (acpi_id[0x47] high edge lint[0x1]) Jul 10 00:57:30.663013 kernel: ACPI: LAPIC_NMI (acpi_id[0x48] high edge lint[0x1]) Jul 10 00:57:30.663019 kernel: ACPI: LAPIC_NMI (acpi_id[0x49] high edge lint[0x1]) Jul 10 00:57:30.663024 kernel: ACPI: LAPIC_NMI (acpi_id[0x4a] high edge lint[0x1]) Jul 10 00:57:30.663032 kernel: ACPI: LAPIC_NMI (acpi_id[0x4b] high edge lint[0x1]) Jul 10 00:57:30.663039 kernel: ACPI: LAPIC_NMI (acpi_id[0x4c] high edge lint[0x1]) Jul 10 00:57:30.663044 kernel: ACPI: LAPIC_NMI (acpi_id[0x4d] high edge lint[0x1]) Jul 10 00:57:30.663050 kernel: ACPI: LAPIC_NMI (acpi_id[0x4e] high edge lint[0x1]) Jul 10 00:57:30.663055 kernel: ACPI: LAPIC_NMI (acpi_id[0x4f] high edge lint[0x1]) Jul 10 00:57:30.663060 kernel: ACPI: LAPIC_NMI (acpi_id[0x50] high edge lint[0x1]) Jul 10 00:57:30.663065 kernel: ACPI: LAPIC_NMI (acpi_id[0x51] high edge lint[0x1]) Jul 10 00:57:30.663070 kernel: ACPI: LAPIC_NMI (acpi_id[0x52] high edge lint[0x1]) Jul 10 00:57:30.663075 kernel: ACPI: LAPIC_NMI (acpi_id[0x53] high edge lint[0x1]) Jul 10 00:57:30.663080 kernel: ACPI: LAPIC_NMI (acpi_id[0x54] high edge lint[0x1]) Jul 10 00:57:30.663085 kernel: ACPI: LAPIC_NMI (acpi_id[0x55] high edge lint[0x1]) Jul 10 00:57:30.663092 kernel: ACPI: LAPIC_NMI (acpi_id[0x56] high edge lint[0x1]) Jul 10 00:57:30.663097 kernel: ACPI: LAPIC_NMI (acpi_id[0x57] high edge lint[0x1]) Jul 10 00:57:30.663102 kernel: ACPI: LAPIC_NMI (acpi_id[0x58] high edge lint[0x1]) Jul 10 00:57:30.663107 kernel: ACPI: LAPIC_NMI (acpi_id[0x59] high edge lint[0x1]) Jul 10 00:57:30.663112 kernel: ACPI: LAPIC_NMI (acpi_id[0x5a] high edge lint[0x1]) Jul 10 00:57:30.663118 kernel: ACPI: LAPIC_NMI (acpi_id[0x5b] high edge lint[0x1]) Jul 10 00:57:30.663123 kernel: ACPI: LAPIC_NMI (acpi_id[0x5c] high edge lint[0x1]) Jul 10 00:57:30.663128 kernel: ACPI: LAPIC_NMI (acpi_id[0x5d] high edge lint[0x1]) Jul 10 00:57:30.663133 kernel: ACPI: LAPIC_NMI (acpi_id[0x5e] high edge lint[0x1]) Jul 10 00:57:30.663139 kernel: ACPI: LAPIC_NMI (acpi_id[0x5f] high edge lint[0x1]) Jul 10 00:57:30.663145 kernel: ACPI: LAPIC_NMI (acpi_id[0x60] high edge lint[0x1]) Jul 10 00:57:30.663150 kernel: ACPI: LAPIC_NMI (acpi_id[0x61] high edge lint[0x1]) Jul 10 00:57:30.663155 kernel: ACPI: LAPIC_NMI (acpi_id[0x62] high edge lint[0x1]) Jul 10 00:57:30.663160 kernel: ACPI: LAPIC_NMI (acpi_id[0x63] high edge lint[0x1]) Jul 10 00:57:30.663165 kernel: ACPI: LAPIC_NMI (acpi_id[0x64] high edge lint[0x1]) Jul 10 00:57:30.663171 kernel: ACPI: LAPIC_NMI (acpi_id[0x65] high edge lint[0x1]) Jul 10 00:57:30.663176 kernel: ACPI: LAPIC_NMI (acpi_id[0x66] high edge lint[0x1]) Jul 10 00:57:30.663181 kernel: ACPI: LAPIC_NMI (acpi_id[0x67] high edge lint[0x1]) Jul 10 00:57:30.663186 kernel: ACPI: LAPIC_NMI (acpi_id[0x68] high edge lint[0x1]) Jul 10 00:57:30.663193 kernel: ACPI: LAPIC_NMI (acpi_id[0x69] high edge lint[0x1]) Jul 10 00:57:30.663198 kernel: ACPI: LAPIC_NMI (acpi_id[0x6a] high edge lint[0x1]) Jul 10 00:57:30.663203 kernel: ACPI: LAPIC_NMI (acpi_id[0x6b] high edge lint[0x1]) Jul 10 00:57:30.663208 kernel: ACPI: LAPIC_NMI (acpi_id[0x6c] high edge lint[0x1]) Jul 10 00:57:30.663213 kernel: ACPI: LAPIC_NMI (acpi_id[0x6d] high edge lint[0x1]) Jul 10 00:57:30.663219 kernel: ACPI: LAPIC_NMI (acpi_id[0x6e] high edge lint[0x1]) Jul 10 00:57:30.663224 kernel: ACPI: LAPIC_NMI (acpi_id[0x6f] high edge lint[0x1]) Jul 10 00:57:30.663229 kernel: ACPI: LAPIC_NMI (acpi_id[0x70] high edge lint[0x1]) Jul 10 00:57:30.663234 kernel: ACPI: LAPIC_NMI (acpi_id[0x71] high edge lint[0x1]) Jul 10 00:57:30.663241 kernel: ACPI: LAPIC_NMI (acpi_id[0x72] high edge lint[0x1]) Jul 10 00:57:30.663249 kernel: ACPI: LAPIC_NMI (acpi_id[0x73] high edge lint[0x1]) Jul 10 00:57:30.663254 kernel: ACPI: LAPIC_NMI (acpi_id[0x74] high edge lint[0x1]) Jul 10 00:57:30.663259 kernel: ACPI: LAPIC_NMI (acpi_id[0x75] high edge lint[0x1]) Jul 10 00:57:30.663264 kernel: ACPI: LAPIC_NMI (acpi_id[0x76] high edge lint[0x1]) Jul 10 00:57:30.663269 kernel: ACPI: LAPIC_NMI (acpi_id[0x77] high edge lint[0x1]) Jul 10 00:57:30.663275 kernel: ACPI: LAPIC_NMI (acpi_id[0x78] high edge lint[0x1]) Jul 10 00:57:30.663280 kernel: ACPI: LAPIC_NMI (acpi_id[0x79] high edge lint[0x1]) Jul 10 00:57:30.663285 kernel: ACPI: LAPIC_NMI (acpi_id[0x7a] high edge lint[0x1]) Jul 10 00:57:30.663290 kernel: ACPI: LAPIC_NMI (acpi_id[0x7b] high edge lint[0x1]) Jul 10 00:57:30.663297 kernel: ACPI: LAPIC_NMI (acpi_id[0x7c] high edge lint[0x1]) Jul 10 00:57:30.663302 kernel: ACPI: LAPIC_NMI (acpi_id[0x7d] high edge lint[0x1]) Jul 10 00:57:30.663307 kernel: ACPI: LAPIC_NMI (acpi_id[0x7e] high edge lint[0x1]) Jul 10 00:57:30.663312 kernel: ACPI: LAPIC_NMI (acpi_id[0x7f] high edge lint[0x1]) Jul 10 00:57:30.663318 kernel: IOAPIC[0]: apic_id 1, version 17, address 0xfec00000, GSI 0-23 Jul 10 00:57:30.663323 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 high edge) Jul 10 00:57:30.663328 kernel: ACPI: Using ACPI (MADT) for SMP configuration information Jul 10 00:57:30.663334 kernel: ACPI: HPET id: 0x8086af01 base: 0xfed00000 Jul 10 00:57:30.663339 kernel: TSC deadline timer available Jul 10 00:57:30.663345 kernel: smpboot: Allowing 128 CPUs, 126 hotplug CPUs Jul 10 00:57:30.663351 kernel: [mem 0x80000000-0xefffffff] available for PCI devices Jul 10 00:57:30.663356 kernel: Booting paravirtualized kernel on VMware hypervisor Jul 10 00:57:30.663362 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns Jul 10 00:57:30.663367 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:128 nr_node_ids:1 Jul 10 00:57:30.663372 kernel: percpu: Embedded 56 pages/cpu s188696 r8192 d32488 u262144 Jul 10 00:57:30.663378 kernel: pcpu-alloc: s188696 r8192 d32488 u262144 alloc=1*2097152 Jul 10 00:57:30.663383 kernel: pcpu-alloc: [0] 000 001 002 003 004 005 006 007 Jul 10 00:57:30.663388 kernel: pcpu-alloc: [0] 008 009 010 011 012 013 014 015 Jul 10 00:57:30.663395 kernel: pcpu-alloc: [0] 016 017 018 019 020 021 022 023 Jul 10 00:57:30.663400 kernel: pcpu-alloc: [0] 024 025 026 027 028 029 030 031 Jul 10 00:57:30.663405 kernel: pcpu-alloc: [0] 032 033 034 035 036 037 038 039 Jul 10 00:57:30.663411 kernel: pcpu-alloc: [0] 040 041 042 043 044 045 046 047 Jul 10 00:57:30.663416 kernel: pcpu-alloc: [0] 048 049 050 051 052 053 054 055 Jul 10 00:57:30.663429 kernel: pcpu-alloc: [0] 056 057 058 059 060 061 062 063 Jul 10 00:57:30.663435 kernel: pcpu-alloc: [0] 064 065 066 067 068 069 070 071 Jul 10 00:57:30.663441 kernel: pcpu-alloc: [0] 072 073 074 075 076 077 078 079 Jul 10 00:57:30.663447 kernel: pcpu-alloc: [0] 080 081 082 083 084 085 086 087 Jul 10 00:57:30.663453 kernel: pcpu-alloc: [0] 088 089 090 091 092 093 094 095 Jul 10 00:57:30.663458 kernel: pcpu-alloc: [0] 096 097 098 099 100 101 102 103 Jul 10 00:57:30.663463 kernel: pcpu-alloc: [0] 104 105 106 107 108 109 110 111 Jul 10 00:57:30.663469 kernel: pcpu-alloc: [0] 112 113 114 115 116 117 118 119 Jul 10 00:57:30.663476 kernel: pcpu-alloc: [0] 120 121 122 123 124 125 126 127 Jul 10 00:57:30.663484 kernel: Built 1 zonelists, mobility grouping on. Total pages: 515808 Jul 10 00:57:30.663490 kernel: Policy zone: DMA32 Jul 10 00:57:30.663497 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=vmware flatcar.autologin verity.usrhash=6cddad5f675165861f6062277cc28875548c735477e689762fc73abc16b63a3d Jul 10 00:57:30.663504 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Jul 10 00:57:30.663509 kernel: printk: log_buf_len individual max cpu contribution: 4096 bytes Jul 10 00:57:30.663515 kernel: printk: log_buf_len total cpu_extra contributions: 520192 bytes Jul 10 00:57:30.663521 kernel: printk: log_buf_len min size: 262144 bytes Jul 10 00:57:30.663527 kernel: printk: log_buf_len: 1048576 bytes Jul 10 00:57:30.663532 kernel: printk: early log buf free: 239728(91%) Jul 10 00:57:30.663538 kernel: Dentry cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) Jul 10 00:57:30.663544 kernel: Inode-cache hash table entries: 131072 (order: 8, 1048576 bytes, linear) Jul 10 00:57:30.663551 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Jul 10 00:57:30.663557 kernel: Memory: 1940392K/2096628K available (12295K kernel code, 2275K rwdata, 13724K rodata, 47472K init, 4108K bss, 155976K reserved, 0K cma-reserved) Jul 10 00:57:30.663563 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=128, Nodes=1 Jul 10 00:57:30.663568 kernel: ftrace: allocating 34602 entries in 136 pages Jul 10 00:57:30.663574 kernel: ftrace: allocated 136 pages with 2 groups Jul 10 00:57:30.663581 kernel: rcu: Hierarchical RCU implementation. Jul 10 00:57:30.663588 kernel: rcu: RCU event tracing is enabled. Jul 10 00:57:30.663594 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=128. Jul 10 00:57:30.663600 kernel: Rude variant of Tasks RCU enabled. Jul 10 00:57:30.663607 kernel: Tracing variant of Tasks RCU enabled. Jul 10 00:57:30.663616 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Jul 10 00:57:30.663625 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=128 Jul 10 00:57:30.663632 kernel: NR_IRQS: 33024, nr_irqs: 1448, preallocated irqs: 16 Jul 10 00:57:30.663638 kernel: random: crng init done Jul 10 00:57:30.663643 kernel: Console: colour VGA+ 80x25 Jul 10 00:57:30.663653 kernel: printk: console [tty0] enabled Jul 10 00:57:30.663661 kernel: printk: console [ttyS0] enabled Jul 10 00:57:30.663669 kernel: ACPI: Core revision 20210730 Jul 10 00:57:30.663678 kernel: clocksource: hpet: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 133484882848 ns Jul 10 00:57:30.663688 kernel: APIC: Switch to symmetric I/O mode setup Jul 10 00:57:30.663697 kernel: x2apic enabled Jul 10 00:57:30.663704 kernel: Switched APIC routing to physical x2apic. Jul 10 00:57:30.663709 kernel: ..TIMER: vector=0x30 apic1=0 pin1=2 apic2=-1 pin2=-1 Jul 10 00:57:30.664839 kernel: clocksource: tsc-early: mask: 0xffffffffffffffff max_cycles: 0x311fd3cd494, max_idle_ns: 440795223879 ns Jul 10 00:57:30.664849 kernel: Calibrating delay loop (skipped) preset value.. 6816.00 BogoMIPS (lpj=3408000) Jul 10 00:57:30.664855 kernel: Disabled fast string operations Jul 10 00:57:30.664861 kernel: Last level iTLB entries: 4KB 64, 2MB 8, 4MB 8 Jul 10 00:57:30.664867 kernel: Last level dTLB entries: 4KB 64, 2MB 32, 4MB 32, 1GB 4 Jul 10 00:57:30.664872 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization Jul 10 00:57:30.664878 kernel: Spectre V2 : WARNING: Unprivileged eBPF is enabled with eIBRS on, data leaks possible via Spectre v2 BHB attacks! Jul 10 00:57:30.664885 kernel: Spectre V2 : Spectre BHI mitigation: SW BHB clearing on vm exit Jul 10 00:57:30.664891 kernel: Spectre V2 : Spectre BHI mitigation: SW BHB clearing on syscall Jul 10 00:57:30.664897 kernel: Spectre V2 : Mitigation: Enhanced / Automatic IBRS Jul 10 00:57:30.664903 kernel: Spectre V2 : Spectre v2 / PBRSB-eIBRS: Retire a single CALL on VMEXIT Jul 10 00:57:30.664911 kernel: RETBleed: Mitigation: Enhanced IBRS Jul 10 00:57:30.664919 kernel: Spectre V2 : mitigation: Enabling conditional Indirect Branch Prediction Barrier Jul 10 00:57:30.664924 kernel: Speculative Store Bypass: Mitigation: Speculative Store Bypass disabled via prctl and seccomp Jul 10 00:57:30.664930 kernel: MMIO Stale Data: Vulnerable: Clear CPU buffers attempted, no microcode Jul 10 00:57:30.664936 kernel: SRBDS: Unknown: Dependent on hypervisor status Jul 10 00:57:30.664942 kernel: GDS: Unknown: Dependent on hypervisor status Jul 10 00:57:30.664947 kernel: ITS: Mitigation: Aligned branch/return thunks Jul 10 00:57:30.664953 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' Jul 10 00:57:30.664960 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' Jul 10 00:57:30.664966 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' Jul 10 00:57:30.664972 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 Jul 10 00:57:30.664978 kernel: x86/fpu: Enabled xstate features 0x7, context size is 832 bytes, using 'compacted' format. Jul 10 00:57:30.664983 kernel: Freeing SMP alternatives memory: 32K Jul 10 00:57:30.664989 kernel: pid_max: default: 131072 minimum: 1024 Jul 10 00:57:30.664995 kernel: LSM: Security Framework initializing Jul 10 00:57:30.665001 kernel: SELinux: Initializing. Jul 10 00:57:30.665007 kernel: Mount-cache hash table entries: 4096 (order: 3, 32768 bytes, linear) Jul 10 00:57:30.665013 kernel: Mountpoint-cache hash table entries: 4096 (order: 3, 32768 bytes, linear) Jul 10 00:57:30.665019 kernel: smpboot: CPU0: Intel(R) Xeon(R) E-2278G CPU @ 3.40GHz (family: 0x6, model: 0x9e, stepping: 0xd) Jul 10 00:57:30.665025 kernel: Performance Events: Skylake events, core PMU driver. Jul 10 00:57:30.665030 kernel: core: CPUID marked event: 'cpu cycles' unavailable Jul 10 00:57:30.665036 kernel: core: CPUID marked event: 'instructions' unavailable Jul 10 00:57:30.665042 kernel: core: CPUID marked event: 'bus cycles' unavailable Jul 10 00:57:30.665047 kernel: core: CPUID marked event: 'cache references' unavailable Jul 10 00:57:30.665053 kernel: core: CPUID marked event: 'cache misses' unavailable Jul 10 00:57:30.665059 kernel: core: CPUID marked event: 'branch instructions' unavailable Jul 10 00:57:30.665065 kernel: core: CPUID marked event: 'branch misses' unavailable Jul 10 00:57:30.665070 kernel: ... version: 1 Jul 10 00:57:30.665076 kernel: ... bit width: 48 Jul 10 00:57:30.665081 kernel: ... generic registers: 4 Jul 10 00:57:30.665087 kernel: ... value mask: 0000ffffffffffff Jul 10 00:57:30.665094 kernel: ... max period: 000000007fffffff Jul 10 00:57:30.665102 kernel: ... fixed-purpose events: 0 Jul 10 00:57:30.665107 kernel: ... event mask: 000000000000000f Jul 10 00:57:30.665115 kernel: signal: max sigframe size: 1776 Jul 10 00:57:30.665120 kernel: rcu: Hierarchical SRCU implementation. Jul 10 00:57:30.665126 kernel: NMI watchdog: Perf NMI watchdog permanently disabled Jul 10 00:57:30.665132 kernel: smp: Bringing up secondary CPUs ... Jul 10 00:57:30.665138 kernel: x86: Booting SMP configuration: Jul 10 00:57:30.665144 kernel: .... node #0, CPUs: #1 Jul 10 00:57:30.665149 kernel: Disabled fast string operations Jul 10 00:57:30.665157 kernel: smpboot: CPU 1 Converting physical 2 to logical package 1 Jul 10 00:57:30.665166 kernel: smpboot: CPU 1 Converting physical 0 to logical die 1 Jul 10 00:57:30.665174 kernel: smp: Brought up 1 node, 2 CPUs Jul 10 00:57:30.665184 kernel: smpboot: Max logical packages: 128 Jul 10 00:57:30.665194 kernel: smpboot: Total of 2 processors activated (13632.00 BogoMIPS) Jul 10 00:57:30.665200 kernel: devtmpfs: initialized Jul 10 00:57:30.665206 kernel: x86/mm: Memory block size: 128MB Jul 10 00:57:30.665211 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x7feff000-0x7fefffff] (4096 bytes) Jul 10 00:57:30.665217 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Jul 10 00:57:30.665223 kernel: futex hash table entries: 32768 (order: 9, 2097152 bytes, linear) Jul 10 00:57:30.665228 kernel: pinctrl core: initialized pinctrl subsystem Jul 10 00:57:30.665234 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Jul 10 00:57:30.665241 kernel: audit: initializing netlink subsys (disabled) Jul 10 00:57:30.665247 kernel: audit: type=2000 audit(1752109048.087:1): state=initialized audit_enabled=0 res=1 Jul 10 00:57:30.665255 kernel: thermal_sys: Registered thermal governor 'step_wise' Jul 10 00:57:30.665261 kernel: thermal_sys: Registered thermal governor 'user_space' Jul 10 00:57:30.665267 kernel: cpuidle: using governor menu Jul 10 00:57:30.665273 kernel: Simple Boot Flag at 0x36 set to 0x80 Jul 10 00:57:30.665278 kernel: ACPI: bus type PCI registered Jul 10 00:57:30.665284 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Jul 10 00:57:30.665290 kernel: dca service started, version 1.12.1 Jul 10 00:57:30.665297 kernel: PCI: MMCONFIG for domain 0000 [bus 00-7f] at [mem 0xf0000000-0xf7ffffff] (base 0xf0000000) Jul 10 00:57:30.665303 kernel: PCI: MMCONFIG at [mem 0xf0000000-0xf7ffffff] reserved in E820 Jul 10 00:57:30.665309 kernel: PCI: Using configuration type 1 for base access Jul 10 00:57:30.665315 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. Jul 10 00:57:30.665320 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Jul 10 00:57:30.665326 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Jul 10 00:57:30.665332 kernel: ACPI: Added _OSI(Module Device) Jul 10 00:57:30.665337 kernel: ACPI: Added _OSI(Processor Device) Jul 10 00:57:30.665343 kernel: ACPI: Added _OSI(Processor Aggregator Device) Jul 10 00:57:30.665349 kernel: ACPI: Added _OSI(Linux-Dell-Video) Jul 10 00:57:30.665355 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Jul 10 00:57:30.665361 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Jul 10 00:57:30.665367 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded Jul 10 00:57:30.665372 kernel: ACPI: [Firmware Bug]: BIOS _OSI(Linux) query ignored Jul 10 00:57:30.665378 kernel: ACPI: Interpreter enabled Jul 10 00:57:30.665383 kernel: ACPI: PM: (supports S0 S1 S5) Jul 10 00:57:30.665389 kernel: ACPI: Using IOAPIC for interrupt routing Jul 10 00:57:30.665395 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug Jul 10 00:57:30.665402 kernel: ACPI: Enabled 4 GPEs in block 00 to 0F Jul 10 00:57:30.665407 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-7f]) Jul 10 00:57:30.665500 kernel: acpi PNP0A03:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI HPX-Type3] Jul 10 00:57:30.665555 kernel: acpi PNP0A03:00: _OSC: platform does not support [AER LTR] Jul 10 00:57:30.665603 kernel: acpi PNP0A03:00: _OSC: OS now controls [PCIeHotplug PME PCIeCapability] Jul 10 00:57:30.665611 kernel: PCI host bridge to bus 0000:00 Jul 10 00:57:30.665665 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] Jul 10 00:57:30.665712 kernel: pci_bus 0000:00: root bus resource [mem 0x000cc000-0x000dbfff window] Jul 10 00:57:30.665770 kernel: pci_bus 0000:00: root bus resource [mem 0xc0000000-0xfebfffff window] Jul 10 00:57:30.665815 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] Jul 10 00:57:30.665863 kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xfeff window] Jul 10 00:57:30.665905 kernel: pci_bus 0000:00: root bus resource [bus 00-7f] Jul 10 00:57:30.665965 kernel: pci 0000:00:00.0: [8086:7190] type 00 class 0x060000 Jul 10 00:57:30.666028 kernel: pci 0000:00:01.0: [8086:7191] type 01 class 0x060400 Jul 10 00:57:30.666087 kernel: pci 0000:00:07.0: [8086:7110] type 00 class 0x060100 Jul 10 00:57:30.666142 kernel: pci 0000:00:07.1: [8086:7111] type 00 class 0x01018a Jul 10 00:57:30.666194 kernel: pci 0000:00:07.1: reg 0x20: [io 0x1060-0x106f] Jul 10 00:57:30.666247 kernel: pci 0000:00:07.1: legacy IDE quirk: reg 0x10: [io 0x01f0-0x01f7] Jul 10 00:57:30.666310 kernel: pci 0000:00:07.1: legacy IDE quirk: reg 0x14: [io 0x03f6] Jul 10 00:57:30.666360 kernel: pci 0000:00:07.1: legacy IDE quirk: reg 0x18: [io 0x0170-0x0177] Jul 10 00:57:30.666411 kernel: pci 0000:00:07.1: legacy IDE quirk: reg 0x1c: [io 0x0376] Jul 10 00:57:30.666473 kernel: pci 0000:00:07.3: [8086:7113] type 00 class 0x068000 Jul 10 00:57:30.666525 kernel: pci 0000:00:07.3: quirk: [io 0x1000-0x103f] claimed by PIIX4 ACPI Jul 10 00:57:30.666574 kernel: pci 0000:00:07.3: quirk: [io 0x1040-0x104f] claimed by PIIX4 SMB Jul 10 00:57:30.666626 kernel: pci 0000:00:07.7: [15ad:0740] type 00 class 0x088000 Jul 10 00:57:30.666681 kernel: pci 0000:00:07.7: reg 0x10: [io 0x1080-0x10bf] Jul 10 00:57:30.666740 kernel: pci 0000:00:07.7: reg 0x14: [mem 0xfebfe000-0xfebfffff 64bit] Jul 10 00:57:30.666797 kernel: pci 0000:00:0f.0: [15ad:0405] type 00 class 0x030000 Jul 10 00:57:30.666851 kernel: pci 0000:00:0f.0: reg 0x10: [io 0x1070-0x107f] Jul 10 00:57:30.666900 kernel: pci 0000:00:0f.0: reg 0x14: [mem 0xe8000000-0xefffffff pref] Jul 10 00:57:30.666948 kernel: pci 0000:00:0f.0: reg 0x18: [mem 0xfe000000-0xfe7fffff] Jul 10 00:57:30.666997 kernel: pci 0000:00:0f.0: reg 0x30: [mem 0x00000000-0x00007fff pref] Jul 10 00:57:30.667049 kernel: pci 0000:00:0f.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff] Jul 10 00:57:30.667117 kernel: pci 0000:00:11.0: [15ad:0790] type 01 class 0x060401 Jul 10 00:57:30.667190 kernel: pci 0000:00:15.0: [15ad:07a0] type 01 class 0x060400 Jul 10 00:57:30.667242 kernel: pci 0000:00:15.0: PME# supported from D0 D3hot D3cold Jul 10 00:57:30.667317 kernel: pci 0000:00:15.1: [15ad:07a0] type 01 class 0x060400 Jul 10 00:57:30.667376 kernel: pci 0000:00:15.1: PME# supported from D0 D3hot D3cold Jul 10 00:57:30.667436 kernel: pci 0000:00:15.2: [15ad:07a0] type 01 class 0x060400 Jul 10 00:57:30.667497 kernel: pci 0000:00:15.2: PME# supported from D0 D3hot D3cold Jul 10 00:57:30.667561 kernel: pci 0000:00:15.3: [15ad:07a0] type 01 class 0x060400 Jul 10 00:57:30.667628 kernel: pci 0000:00:15.3: PME# supported from D0 D3hot D3cold Jul 10 00:57:30.667690 kernel: pci 0000:00:15.4: [15ad:07a0] type 01 class 0x060400 Jul 10 00:57:30.667751 kernel: pci 0000:00:15.4: PME# supported from D0 D3hot D3cold Jul 10 00:57:30.667812 kernel: pci 0000:00:15.5: [15ad:07a0] type 01 class 0x060400 Jul 10 00:57:30.667874 kernel: pci 0000:00:15.5: PME# supported from D0 D3hot D3cold Jul 10 00:57:30.667942 kernel: pci 0000:00:15.6: [15ad:07a0] type 01 class 0x060400 Jul 10 00:57:30.668004 kernel: pci 0000:00:15.6: PME# supported from D0 D3hot D3cold Jul 10 00:57:30.668059 kernel: pci 0000:00:15.7: [15ad:07a0] type 01 class 0x060400 Jul 10 00:57:30.668109 kernel: pci 0000:00:15.7: PME# supported from D0 D3hot D3cold Jul 10 00:57:30.668176 kernel: pci 0000:00:16.0: [15ad:07a0] type 01 class 0x060400 Jul 10 00:57:30.668244 kernel: pci 0000:00:16.0: PME# supported from D0 D3hot D3cold Jul 10 00:57:30.668308 kernel: pci 0000:00:16.1: [15ad:07a0] type 01 class 0x060400 Jul 10 00:57:30.668382 kernel: pci 0000:00:16.1: PME# supported from D0 D3hot D3cold Jul 10 00:57:30.668441 kernel: pci 0000:00:16.2: [15ad:07a0] type 01 class 0x060400 Jul 10 00:57:30.668497 kernel: pci 0000:00:16.2: PME# supported from D0 D3hot D3cold Jul 10 00:57:30.668550 kernel: pci 0000:00:16.3: [15ad:07a0] type 01 class 0x060400 Jul 10 00:57:30.668604 kernel: pci 0000:00:16.3: PME# supported from D0 D3hot D3cold Jul 10 00:57:30.668659 kernel: pci 0000:00:16.4: [15ad:07a0] type 01 class 0x060400 Jul 10 00:57:30.668711 kernel: pci 0000:00:16.4: PME# supported from D0 D3hot D3cold Jul 10 00:57:30.668779 kernel: pci 0000:00:16.5: [15ad:07a0] type 01 class 0x060400 Jul 10 00:57:30.668830 kernel: pci 0000:00:16.5: PME# supported from D0 D3hot D3cold Jul 10 00:57:30.668882 kernel: pci 0000:00:16.6: [15ad:07a0] type 01 class 0x060400 Jul 10 00:57:30.668938 kernel: pci 0000:00:16.6: PME# supported from D0 D3hot D3cold Jul 10 00:57:30.668990 kernel: pci 0000:00:16.7: [15ad:07a0] type 01 class 0x060400 Jul 10 00:57:30.669039 kernel: pci 0000:00:16.7: PME# supported from D0 D3hot D3cold Jul 10 00:57:30.669091 kernel: pci 0000:00:17.0: [15ad:07a0] type 01 class 0x060400 Jul 10 00:57:30.669141 kernel: pci 0000:00:17.0: PME# supported from D0 D3hot D3cold Jul 10 00:57:30.669193 kernel: pci 0000:00:17.1: [15ad:07a0] type 01 class 0x060400 Jul 10 00:57:30.669245 kernel: pci 0000:00:17.1: PME# supported from D0 D3hot D3cold Jul 10 00:57:30.669297 kernel: pci 0000:00:17.2: [15ad:07a0] type 01 class 0x060400 Jul 10 00:57:30.669351 kernel: pci 0000:00:17.2: PME# supported from D0 D3hot D3cold Jul 10 00:57:30.669417 kernel: pci 0000:00:17.3: [15ad:07a0] type 01 class 0x060400 Jul 10 00:57:30.669481 kernel: pci 0000:00:17.3: PME# supported from D0 D3hot D3cold Jul 10 00:57:30.669546 kernel: pci 0000:00:17.4: [15ad:07a0] type 01 class 0x060400 Jul 10 00:57:30.669606 kernel: pci 0000:00:17.4: PME# supported from D0 D3hot D3cold Jul 10 00:57:30.669668 kernel: pci 0000:00:17.5: [15ad:07a0] type 01 class 0x060400 Jul 10 00:57:30.669723 kernel: pci 0000:00:17.5: PME# supported from D0 D3hot D3cold Jul 10 00:57:30.669793 kernel: pci 0000:00:17.6: [15ad:07a0] type 01 class 0x060400 Jul 10 00:57:30.669848 kernel: pci 0000:00:17.6: PME# supported from D0 D3hot D3cold Jul 10 00:57:30.669903 kernel: pci 0000:00:17.7: [15ad:07a0] type 01 class 0x060400 Jul 10 00:57:30.669951 kernel: pci 0000:00:17.7: PME# supported from D0 D3hot D3cold Jul 10 00:57:30.670006 kernel: pci 0000:00:18.0: [15ad:07a0] type 01 class 0x060400 Jul 10 00:57:30.670055 kernel: pci 0000:00:18.0: PME# supported from D0 D3hot D3cold Jul 10 00:57:30.670108 kernel: pci 0000:00:18.1: [15ad:07a0] type 01 class 0x060400 Jul 10 00:57:30.670159 kernel: pci 0000:00:18.1: PME# supported from D0 D3hot D3cold Jul 10 00:57:30.670214 kernel: pci 0000:00:18.2: [15ad:07a0] type 01 class 0x060400 Jul 10 00:57:30.670262 kernel: pci 0000:00:18.2: PME# supported from D0 D3hot D3cold Jul 10 00:57:30.670321 kernel: pci 0000:00:18.3: [15ad:07a0] type 01 class 0x060400 Jul 10 00:57:30.670387 kernel: pci 0000:00:18.3: PME# supported from D0 D3hot D3cold Jul 10 00:57:30.670459 kernel: pci 0000:00:18.4: [15ad:07a0] type 01 class 0x060400 Jul 10 00:57:30.670511 kernel: pci 0000:00:18.4: PME# supported from D0 D3hot D3cold Jul 10 00:57:30.670583 kernel: pci 0000:00:18.5: [15ad:07a0] type 01 class 0x060400 Jul 10 00:57:30.670647 kernel: pci 0000:00:18.5: PME# supported from D0 D3hot D3cold Jul 10 00:57:30.670709 kernel: pci 0000:00:18.6: [15ad:07a0] type 01 class 0x060400 Jul 10 00:57:30.670788 kernel: pci 0000:00:18.6: PME# supported from D0 D3hot D3cold Jul 10 00:57:30.670843 kernel: pci 0000:00:18.7: [15ad:07a0] type 01 class 0x060400 Jul 10 00:57:30.670891 kernel: pci 0000:00:18.7: PME# supported from D0 D3hot D3cold Jul 10 00:57:30.670942 kernel: pci_bus 0000:01: extended config space not accessible Jul 10 00:57:30.670993 kernel: pci 0000:00:01.0: PCI bridge to [bus 01] Jul 10 00:57:30.671043 kernel: pci_bus 0000:02: extended config space not accessible Jul 10 00:57:30.671054 kernel: acpiphp: Slot [32] registered Jul 10 00:57:30.671063 kernel: acpiphp: Slot [33] registered Jul 10 00:57:30.671069 kernel: acpiphp: Slot [34] registered Jul 10 00:57:30.671075 kernel: acpiphp: Slot [35] registered Jul 10 00:57:30.671081 kernel: acpiphp: Slot [36] registered Jul 10 00:57:30.671086 kernel: acpiphp: Slot [37] registered Jul 10 00:57:30.671092 kernel: acpiphp: Slot [38] registered Jul 10 00:57:30.671097 kernel: acpiphp: Slot [39] registered Jul 10 00:57:30.671103 kernel: acpiphp: Slot [40] registered Jul 10 00:57:30.671110 kernel: acpiphp: Slot [41] registered Jul 10 00:57:30.671115 kernel: acpiphp: Slot [42] registered Jul 10 00:57:30.671121 kernel: acpiphp: Slot [43] registered Jul 10 00:57:30.671126 kernel: acpiphp: Slot [44] registered Jul 10 00:57:30.671132 kernel: acpiphp: Slot [45] registered Jul 10 00:57:30.671138 kernel: acpiphp: Slot [46] registered Jul 10 00:57:30.671143 kernel: acpiphp: Slot [47] registered Jul 10 00:57:30.671149 kernel: acpiphp: Slot [48] registered Jul 10 00:57:30.671154 kernel: acpiphp: Slot [49] registered Jul 10 00:57:30.671161 kernel: acpiphp: Slot [50] registered Jul 10 00:57:30.671169 kernel: acpiphp: Slot [51] registered Jul 10 00:57:30.671179 kernel: acpiphp: Slot [52] registered Jul 10 00:57:30.671188 kernel: acpiphp: Slot [53] registered Jul 10 00:57:30.671198 kernel: acpiphp: Slot [54] registered Jul 10 00:57:30.671203 kernel: acpiphp: Slot [55] registered Jul 10 00:57:30.671209 kernel: acpiphp: Slot [56] registered Jul 10 00:57:30.671215 kernel: acpiphp: Slot [57] registered Jul 10 00:57:30.671220 kernel: acpiphp: Slot [58] registered Jul 10 00:57:30.671226 kernel: acpiphp: Slot [59] registered Jul 10 00:57:30.671233 kernel: acpiphp: Slot [60] registered Jul 10 00:57:30.671238 kernel: acpiphp: Slot [61] registered Jul 10 00:57:30.671244 kernel: acpiphp: Slot [62] registered Jul 10 00:57:30.671249 kernel: acpiphp: Slot [63] registered Jul 10 00:57:30.671308 kernel: pci 0000:00:11.0: PCI bridge to [bus 02] (subtractive decode) Jul 10 00:57:30.671362 kernel: pci 0000:00:11.0: bridge window [io 0x2000-0x3fff] Jul 10 00:57:30.671416 kernel: pci 0000:00:11.0: bridge window [mem 0xfd600000-0xfdffffff] Jul 10 00:57:30.671480 kernel: pci 0000:00:11.0: bridge window [mem 0xe7b00000-0xe7ffffff 64bit pref] Jul 10 00:57:30.671535 kernel: pci 0000:00:11.0: bridge window [mem 0x000a0000-0x000bffff window] (subtractive decode) Jul 10 00:57:30.671584 kernel: pci 0000:00:11.0: bridge window [mem 0x000cc000-0x000dbfff window] (subtractive decode) Jul 10 00:57:30.671635 kernel: pci 0000:00:11.0: bridge window [mem 0xc0000000-0xfebfffff window] (subtractive decode) Jul 10 00:57:30.671688 kernel: pci 0000:00:11.0: bridge window [io 0x0000-0x0cf7 window] (subtractive decode) Jul 10 00:57:30.671745 kernel: pci 0000:00:11.0: bridge window [io 0x0d00-0xfeff window] (subtractive decode) Jul 10 00:57:30.671807 kernel: pci 0000:03:00.0: [15ad:07c0] type 00 class 0x010700 Jul 10 00:57:30.671858 kernel: pci 0000:03:00.0: reg 0x10: [io 0x4000-0x4007] Jul 10 00:57:30.671912 kernel: pci 0000:03:00.0: reg 0x14: [mem 0xfd5f8000-0xfd5fffff 64bit] Jul 10 00:57:30.671966 kernel: pci 0000:03:00.0: reg 0x30: [mem 0x00000000-0x0000ffff pref] Jul 10 00:57:30.672017 kernel: pci 0000:03:00.0: PME# supported from D0 D3hot D3cold Jul 10 00:57:30.672075 kernel: pci 0000:03:00.0: disabling ASPM on pre-1.1 PCIe device. You can enable it with 'pcie_aspm=force' Jul 10 00:57:30.672130 kernel: pci 0000:00:15.0: PCI bridge to [bus 03] Jul 10 00:57:30.672185 kernel: pci 0000:00:15.0: bridge window [io 0x4000-0x4fff] Jul 10 00:57:30.672242 kernel: pci 0000:00:15.0: bridge window [mem 0xfd500000-0xfd5fffff] Jul 10 00:57:30.672298 kernel: pci 0000:00:15.1: PCI bridge to [bus 04] Jul 10 00:57:30.672354 kernel: pci 0000:00:15.1: bridge window [io 0x8000-0x8fff] Jul 10 00:57:30.672405 kernel: pci 0000:00:15.1: bridge window [mem 0xfd100000-0xfd1fffff] Jul 10 00:57:30.672468 kernel: pci 0000:00:15.1: bridge window [mem 0xe7800000-0xe78fffff 64bit pref] Jul 10 00:57:30.672520 kernel: pci 0000:00:15.2: PCI bridge to [bus 05] Jul 10 00:57:30.672569 kernel: pci 0000:00:15.2: bridge window [io 0xc000-0xcfff] Jul 10 00:57:30.672618 kernel: pci 0000:00:15.2: bridge window [mem 0xfcd00000-0xfcdfffff] Jul 10 00:57:30.672667 kernel: pci 0000:00:15.2: bridge window [mem 0xe7400000-0xe74fffff 64bit pref] Jul 10 00:57:30.672719 kernel: pci 0000:00:15.3: PCI bridge to [bus 06] Jul 10 00:57:30.672903 kernel: pci 0000:00:15.3: bridge window [mem 0xfc900000-0xfc9fffff] Jul 10 00:57:30.672954 kernel: pci 0000:00:15.3: bridge window [mem 0xe7000000-0xe70fffff 64bit pref] Jul 10 00:57:30.673005 kernel: pci 0000:00:15.4: PCI bridge to [bus 07] Jul 10 00:57:30.673057 kernel: pci 0000:00:15.4: bridge window [mem 0xfc500000-0xfc5fffff] Jul 10 00:57:30.673105 kernel: pci 0000:00:15.4: bridge window [mem 0xe6c00000-0xe6cfffff 64bit pref] Jul 10 00:57:30.673156 kernel: pci 0000:00:15.5: PCI bridge to [bus 08] Jul 10 00:57:30.673204 kernel: pci 0000:00:15.5: bridge window [mem 0xfc100000-0xfc1fffff] Jul 10 00:57:30.673253 kernel: pci 0000:00:15.5: bridge window [mem 0xe6800000-0xe68fffff 64bit pref] Jul 10 00:57:30.673304 kernel: pci 0000:00:15.6: PCI bridge to [bus 09] Jul 10 00:57:30.673352 kernel: pci 0000:00:15.6: bridge window [mem 0xfbd00000-0xfbdfffff] Jul 10 00:57:30.673400 kernel: pci 0000:00:15.6: bridge window [mem 0xe6400000-0xe64fffff 64bit pref] Jul 10 00:57:30.673449 kernel: pci 0000:00:15.7: PCI bridge to [bus 0a] Jul 10 00:57:30.673514 kernel: pci 0000:00:15.7: bridge window [mem 0xfb900000-0xfb9fffff] Jul 10 00:57:30.673564 kernel: pci 0000:00:15.7: bridge window [mem 0xe6000000-0xe60fffff 64bit pref] Jul 10 00:57:30.673618 kernel: pci 0000:0b:00.0: [15ad:07b0] type 00 class 0x020000 Jul 10 00:57:30.673674 kernel: pci 0000:0b:00.0: reg 0x10: [mem 0xfd4fc000-0xfd4fcfff] Jul 10 00:57:30.673724 kernel: pci 0000:0b:00.0: reg 0x14: [mem 0xfd4fd000-0xfd4fdfff] Jul 10 00:57:30.673783 kernel: pci 0000:0b:00.0: reg 0x18: [mem 0xfd4fe000-0xfd4fffff] Jul 10 00:57:30.673845 kernel: pci 0000:0b:00.0: reg 0x1c: [io 0x5000-0x500f] Jul 10 00:57:30.673921 kernel: pci 0000:0b:00.0: reg 0x30: [mem 0x00000000-0x0000ffff pref] Jul 10 00:57:30.673981 kernel: pci 0000:0b:00.0: supports D1 D2 Jul 10 00:57:30.674050 kernel: pci 0000:0b:00.0: PME# supported from D0 D1 D2 D3hot D3cold Jul 10 00:57:30.674114 kernel: pci 0000:0b:00.0: disabling ASPM on pre-1.1 PCIe device. You can enable it with 'pcie_aspm=force' Jul 10 00:57:30.674171 kernel: pci 0000:00:16.0: PCI bridge to [bus 0b] Jul 10 00:57:30.674226 kernel: pci 0000:00:16.0: bridge window [io 0x5000-0x5fff] Jul 10 00:57:30.674277 kernel: pci 0000:00:16.0: bridge window [mem 0xfd400000-0xfd4fffff] Jul 10 00:57:30.674334 kernel: pci 0000:00:16.1: PCI bridge to [bus 0c] Jul 10 00:57:30.674393 kernel: pci 0000:00:16.1: bridge window [io 0x9000-0x9fff] Jul 10 00:57:30.674449 kernel: pci 0000:00:16.1: bridge window [mem 0xfd000000-0xfd0fffff] Jul 10 00:57:30.674497 kernel: pci 0000:00:16.1: bridge window [mem 0xe7700000-0xe77fffff 64bit pref] Jul 10 00:57:30.674558 kernel: pci 0000:00:16.2: PCI bridge to [bus 0d] Jul 10 00:57:30.674615 kernel: pci 0000:00:16.2: bridge window [io 0xd000-0xdfff] Jul 10 00:57:30.674663 kernel: pci 0000:00:16.2: bridge window [mem 0xfcc00000-0xfccfffff] Jul 10 00:57:30.674712 kernel: pci 0000:00:16.2: bridge window [mem 0xe7300000-0xe73fffff 64bit pref] Jul 10 00:57:30.674807 kernel: pci 0000:00:16.3: PCI bridge to [bus 0e] Jul 10 00:57:30.674871 kernel: pci 0000:00:16.3: bridge window [mem 0xfc800000-0xfc8fffff] Jul 10 00:57:30.674925 kernel: pci 0000:00:16.3: bridge window [mem 0xe6f00000-0xe6ffffff 64bit pref] Jul 10 00:57:30.674986 kernel: pci 0000:00:16.4: PCI bridge to [bus 0f] Jul 10 00:57:30.675040 kernel: pci 0000:00:16.4: bridge window [mem 0xfc400000-0xfc4fffff] Jul 10 00:57:30.675095 kernel: pci 0000:00:16.4: bridge window [mem 0xe6b00000-0xe6bfffff 64bit pref] Jul 10 00:57:30.675143 kernel: pci 0000:00:16.5: PCI bridge to [bus 10] Jul 10 00:57:30.675190 kernel: pci 0000:00:16.5: bridge window [mem 0xfc000000-0xfc0fffff] Jul 10 00:57:30.675248 kernel: pci 0000:00:16.5: bridge window [mem 0xe6700000-0xe67fffff 64bit pref] Jul 10 00:57:30.675298 kernel: pci 0000:00:16.6: PCI bridge to [bus 11] Jul 10 00:57:30.675346 kernel: pci 0000:00:16.6: bridge window [mem 0xfbc00000-0xfbcfffff] Jul 10 00:57:30.675394 kernel: pci 0000:00:16.6: bridge window [mem 0xe6300000-0xe63fffff 64bit pref] Jul 10 00:57:30.675447 kernel: pci 0000:00:16.7: PCI bridge to [bus 12] Jul 10 00:57:30.675496 kernel: pci 0000:00:16.7: bridge window [mem 0xfb800000-0xfb8fffff] Jul 10 00:57:30.675549 kernel: pci 0000:00:16.7: bridge window [mem 0xe5f00000-0xe5ffffff 64bit pref] Jul 10 00:57:30.675599 kernel: pci 0000:00:17.0: PCI bridge to [bus 13] Jul 10 00:57:30.675649 kernel: pci 0000:00:17.0: bridge window [io 0x6000-0x6fff] Jul 10 00:57:30.675696 kernel: pci 0000:00:17.0: bridge window [mem 0xfd300000-0xfd3fffff] Jul 10 00:57:30.675751 kernel: pci 0000:00:17.0: bridge window [mem 0xe7a00000-0xe7afffff 64bit pref] Jul 10 00:57:30.675801 kernel: pci 0000:00:17.1: PCI bridge to [bus 14] Jul 10 00:57:30.675849 kernel: pci 0000:00:17.1: bridge window [io 0xa000-0xafff] Jul 10 00:57:30.675896 kernel: pci 0000:00:17.1: bridge window [mem 0xfcf00000-0xfcffffff] Jul 10 00:57:30.675951 kernel: pci 0000:00:17.1: bridge window [mem 0xe7600000-0xe76fffff 64bit pref] Jul 10 00:57:30.676001 kernel: pci 0000:00:17.2: PCI bridge to [bus 15] Jul 10 00:57:30.676053 kernel: pci 0000:00:17.2: bridge window [io 0xe000-0xefff] Jul 10 00:57:30.676115 kernel: pci 0000:00:17.2: bridge window [mem 0xfcb00000-0xfcbfffff] Jul 10 00:57:30.676172 kernel: pci 0000:00:17.2: bridge window [mem 0xe7200000-0xe72fffff 64bit pref] Jul 10 00:57:30.676229 kernel: pci 0000:00:17.3: PCI bridge to [bus 16] Jul 10 00:57:30.676285 kernel: pci 0000:00:17.3: bridge window [mem 0xfc700000-0xfc7fffff] Jul 10 00:57:30.676333 kernel: pci 0000:00:17.3: bridge window [mem 0xe6e00000-0xe6efffff 64bit pref] Jul 10 00:57:30.676383 kernel: pci 0000:00:17.4: PCI bridge to [bus 17] Jul 10 00:57:30.676431 kernel: pci 0000:00:17.4: bridge window [mem 0xfc300000-0xfc3fffff] Jul 10 00:57:30.676481 kernel: pci 0000:00:17.4: bridge window [mem 0xe6a00000-0xe6afffff 64bit pref] Jul 10 00:57:30.676536 kernel: pci 0000:00:17.5: PCI bridge to [bus 18] Jul 10 00:57:30.676584 kernel: pci 0000:00:17.5: bridge window [mem 0xfbf00000-0xfbffffff] Jul 10 00:57:30.676646 kernel: pci 0000:00:17.5: bridge window [mem 0xe6600000-0xe66fffff 64bit pref] Jul 10 00:57:30.676697 kernel: pci 0000:00:17.6: PCI bridge to [bus 19] Jul 10 00:57:30.676787 kernel: pci 0000:00:17.6: bridge window [mem 0xfbb00000-0xfbbfffff] Jul 10 00:57:30.676839 kernel: pci 0000:00:17.6: bridge window [mem 0xe6200000-0xe62fffff 64bit pref] Jul 10 00:57:30.676898 kernel: pci 0000:00:17.7: PCI bridge to [bus 1a] Jul 10 00:57:30.676953 kernel: pci 0000:00:17.7: bridge window [mem 0xfb700000-0xfb7fffff] Jul 10 00:57:30.677010 kernel: pci 0000:00:17.7: bridge window [mem 0xe5e00000-0xe5efffff 64bit pref] Jul 10 00:57:30.677073 kernel: pci 0000:00:18.0: PCI bridge to [bus 1b] Jul 10 00:57:30.677128 kernel: pci 0000:00:18.0: bridge window [io 0x7000-0x7fff] Jul 10 00:57:30.677184 kernel: pci 0000:00:18.0: bridge window [mem 0xfd200000-0xfd2fffff] Jul 10 00:57:30.677233 kernel: pci 0000:00:18.0: bridge window [mem 0xe7900000-0xe79fffff 64bit pref] Jul 10 00:57:30.677282 kernel: pci 0000:00:18.1: PCI bridge to [bus 1c] Jul 10 00:57:30.677331 kernel: pci 0000:00:18.1: bridge window [io 0xb000-0xbfff] Jul 10 00:57:30.677379 kernel: pci 0000:00:18.1: bridge window [mem 0xfce00000-0xfcefffff] Jul 10 00:57:30.677426 kernel: pci 0000:00:18.1: bridge window [mem 0xe7500000-0xe75fffff 64bit pref] Jul 10 00:57:30.677482 kernel: pci 0000:00:18.2: PCI bridge to [bus 1d] Jul 10 00:57:30.677531 kernel: pci 0000:00:18.2: bridge window [mem 0xfca00000-0xfcafffff] Jul 10 00:57:30.677579 kernel: pci 0000:00:18.2: bridge window [mem 0xe7100000-0xe71fffff 64bit pref] Jul 10 00:57:30.677641 kernel: pci 0000:00:18.3: PCI bridge to [bus 1e] Jul 10 00:57:30.677719 kernel: pci 0000:00:18.3: bridge window [mem 0xfc600000-0xfc6fffff] Jul 10 00:57:30.677793 kernel: pci 0000:00:18.3: bridge window [mem 0xe6d00000-0xe6dfffff 64bit pref] Jul 10 00:57:30.677852 kernel: pci 0000:00:18.4: PCI bridge to [bus 1f] Jul 10 00:57:30.678165 kernel: pci 0000:00:18.4: bridge window [mem 0xfc200000-0xfc2fffff] Jul 10 00:57:30.678227 kernel: pci 0000:00:18.4: bridge window [mem 0xe6900000-0xe69fffff 64bit pref] Jul 10 00:57:30.678282 kernel: pci 0000:00:18.5: PCI bridge to [bus 20] Jul 10 00:57:30.678335 kernel: pci 0000:00:18.5: bridge window [mem 0xfbe00000-0xfbefffff] Jul 10 00:57:30.678389 kernel: pci 0000:00:18.5: bridge window [mem 0xe6500000-0xe65fffff 64bit pref] Jul 10 00:57:30.678446 kernel: pci 0000:00:18.6: PCI bridge to [bus 21] Jul 10 00:57:30.678507 kernel: pci 0000:00:18.6: bridge window [mem 0xfba00000-0xfbafffff] Jul 10 00:57:30.678561 kernel: pci 0000:00:18.6: bridge window [mem 0xe6100000-0xe61fffff 64bit pref] Jul 10 00:57:30.678620 kernel: pci 0000:00:18.7: PCI bridge to [bus 22] Jul 10 00:57:30.678681 kernel: pci 0000:00:18.7: bridge window [mem 0xfb600000-0xfb6fffff] Jul 10 00:57:30.678799 kernel: pci 0000:00:18.7: bridge window [mem 0xe5d00000-0xe5dfffff 64bit pref] Jul 10 00:57:30.678811 kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 9 Jul 10 00:57:30.678817 kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 0 Jul 10 00:57:30.678823 kernel: ACPI: PCI: Interrupt link LNKB disabled Jul 10 00:57:30.678829 kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 11 Jul 10 00:57:30.678837 kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 10 Jul 10 00:57:30.678842 kernel: iommu: Default domain type: Translated Jul 10 00:57:30.678848 kernel: iommu: DMA domain TLB invalidation policy: lazy mode Jul 10 00:57:30.678908 kernel: pci 0000:00:0f.0: vgaarb: setting as boot VGA device Jul 10 00:57:30.678961 kernel: pci 0000:00:0f.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none Jul 10 00:57:30.679013 kernel: pci 0000:00:0f.0: vgaarb: bridge control possible Jul 10 00:57:30.679021 kernel: vgaarb: loaded Jul 10 00:57:30.679027 kernel: pps_core: LinuxPPS API ver. 1 registered Jul 10 00:57:30.679034 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Jul 10 00:57:30.679041 kernel: PTP clock support registered Jul 10 00:57:30.679046 kernel: PCI: Using ACPI for IRQ routing Jul 10 00:57:30.679052 kernel: PCI: pci_cache_line_size set to 64 bytes Jul 10 00:57:30.679058 kernel: e820: reserve RAM buffer [mem 0x0009ec00-0x0009ffff] Jul 10 00:57:30.679064 kernel: e820: reserve RAM buffer [mem 0x7fee0000-0x7fffffff] Jul 10 00:57:30.679070 kernel: hpet0: at MMIO 0xfed00000, IRQs 2, 8, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0 Jul 10 00:57:30.679075 kernel: hpet0: 16 comparators, 64-bit 14.318180 MHz counter Jul 10 00:57:30.679081 kernel: clocksource: Switched to clocksource tsc-early Jul 10 00:57:30.679089 kernel: VFS: Disk quotas dquot_6.6.0 Jul 10 00:57:30.679099 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Jul 10 00:57:30.679105 kernel: pnp: PnP ACPI init Jul 10 00:57:30.679165 kernel: system 00:00: [io 0x1000-0x103f] has been reserved Jul 10 00:57:30.679215 kernel: system 00:00: [io 0x1040-0x104f] has been reserved Jul 10 00:57:30.679272 kernel: system 00:00: [io 0x0cf0-0x0cf1] has been reserved Jul 10 00:57:30.679331 kernel: system 00:04: [mem 0xfed00000-0xfed003ff] has been reserved Jul 10 00:57:30.679390 kernel: pnp 00:06: [dma 2] Jul 10 00:57:30.679452 kernel: system 00:07: [io 0xfce0-0xfcff] has been reserved Jul 10 00:57:30.679504 kernel: system 00:07: [mem 0xf0000000-0xf7ffffff] has been reserved Jul 10 00:57:30.679558 kernel: system 00:07: [mem 0xfe800000-0xfe9fffff] has been reserved Jul 10 00:57:30.679566 kernel: pnp: PnP ACPI: found 8 devices Jul 10 00:57:30.679572 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns Jul 10 00:57:30.679578 kernel: NET: Registered PF_INET protocol family Jul 10 00:57:30.679584 kernel: IP idents hash table entries: 32768 (order: 6, 262144 bytes, linear) Jul 10 00:57:30.679591 kernel: tcp_listen_portaddr_hash hash table entries: 1024 (order: 2, 16384 bytes, linear) Jul 10 00:57:30.679597 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Jul 10 00:57:30.679603 kernel: TCP established hash table entries: 16384 (order: 5, 131072 bytes, linear) Jul 10 00:57:30.679609 kernel: TCP bind hash table entries: 16384 (order: 6, 262144 bytes, linear) Jul 10 00:57:30.679614 kernel: TCP: Hash tables configured (established 16384 bind 16384) Jul 10 00:57:30.679620 kernel: UDP hash table entries: 1024 (order: 3, 32768 bytes, linear) Jul 10 00:57:30.679626 kernel: UDP-Lite hash table entries: 1024 (order: 3, 32768 bytes, linear) Jul 10 00:57:30.679632 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Jul 10 00:57:30.679638 kernel: NET: Registered PF_XDP protocol family Jul 10 00:57:30.679693 kernel: pci 0000:00:15.0: bridge window [mem 0x00100000-0x000fffff 64bit pref] to [bus 03] add_size 200000 add_align 100000 Jul 10 00:57:30.679817 kernel: pci 0000:00:15.3: bridge window [io 0x1000-0x0fff] to [bus 06] add_size 1000 Jul 10 00:57:30.679880 kernel: pci 0000:00:15.4: bridge window [io 0x1000-0x0fff] to [bus 07] add_size 1000 Jul 10 00:57:30.679948 kernel: pci 0000:00:15.5: bridge window [io 0x1000-0x0fff] to [bus 08] add_size 1000 Jul 10 00:57:30.680017 kernel: pci 0000:00:15.6: bridge window [io 0x1000-0x0fff] to [bus 09] add_size 1000 Jul 10 00:57:30.680072 kernel: pci 0000:00:15.7: bridge window [io 0x1000-0x0fff] to [bus 0a] add_size 1000 Jul 10 00:57:30.680132 kernel: pci 0000:00:16.0: bridge window [mem 0x00100000-0x000fffff 64bit pref] to [bus 0b] add_size 200000 add_align 100000 Jul 10 00:57:30.680189 kernel: pci 0000:00:16.3: bridge window [io 0x1000-0x0fff] to [bus 0e] add_size 1000 Jul 10 00:57:30.680253 kernel: pci 0000:00:16.4: bridge window [io 0x1000-0x0fff] to [bus 0f] add_size 1000 Jul 10 00:57:30.680315 kernel: pci 0000:00:16.5: bridge window [io 0x1000-0x0fff] to [bus 10] add_size 1000 Jul 10 00:57:30.680366 kernel: pci 0000:00:16.6: bridge window [io 0x1000-0x0fff] to [bus 11] add_size 1000 Jul 10 00:57:30.680416 kernel: pci 0000:00:16.7: bridge window [io 0x1000-0x0fff] to [bus 12] add_size 1000 Jul 10 00:57:30.680473 kernel: pci 0000:00:17.3: bridge window [io 0x1000-0x0fff] to [bus 16] add_size 1000 Jul 10 00:57:30.680522 kernel: pci 0000:00:17.4: bridge window [io 0x1000-0x0fff] to [bus 17] add_size 1000 Jul 10 00:57:30.680575 kernel: pci 0000:00:17.5: bridge window [io 0x1000-0x0fff] to [bus 18] add_size 1000 Jul 10 00:57:30.680624 kernel: pci 0000:00:17.6: bridge window [io 0x1000-0x0fff] to [bus 19] add_size 1000 Jul 10 00:57:30.680714 kernel: pci 0000:00:17.7: bridge window [io 0x1000-0x0fff] to [bus 1a] add_size 1000 Jul 10 00:57:30.683307 kernel: pci 0000:00:18.2: bridge window [io 0x1000-0x0fff] to [bus 1d] add_size 1000 Jul 10 00:57:30.683363 kernel: pci 0000:00:18.3: bridge window [io 0x1000-0x0fff] to [bus 1e] add_size 1000 Jul 10 00:57:30.683418 kernel: pci 0000:00:18.4: bridge window [io 0x1000-0x0fff] to [bus 1f] add_size 1000 Jul 10 00:57:30.683469 kernel: pci 0000:00:18.5: bridge window [io 0x1000-0x0fff] to [bus 20] add_size 1000 Jul 10 00:57:30.683526 kernel: pci 0000:00:18.6: bridge window [io 0x1000-0x0fff] to [bus 21] add_size 1000 Jul 10 00:57:30.683581 kernel: pci 0000:00:18.7: bridge window [io 0x1000-0x0fff] to [bus 22] add_size 1000 Jul 10 00:57:30.683641 kernel: pci 0000:00:15.0: BAR 15: assigned [mem 0xc0000000-0xc01fffff 64bit pref] Jul 10 00:57:30.683705 kernel: pci 0000:00:16.0: BAR 15: assigned [mem 0xc0200000-0xc03fffff 64bit pref] Jul 10 00:57:30.683779 kernel: pci 0000:00:15.3: BAR 13: no space for [io size 0x1000] Jul 10 00:57:30.683838 kernel: pci 0000:00:15.3: BAR 13: failed to assign [io size 0x1000] Jul 10 00:57:30.683889 kernel: pci 0000:00:15.4: BAR 13: no space for [io size 0x1000] Jul 10 00:57:30.683939 kernel: pci 0000:00:15.4: BAR 13: failed to assign [io size 0x1000] Jul 10 00:57:30.683990 kernel: pci 0000:00:15.5: BAR 13: no space for [io size 0x1000] Jul 10 00:57:30.684039 kernel: pci 0000:00:15.5: BAR 13: failed to assign [io size 0x1000] Jul 10 00:57:30.684093 kernel: pci 0000:00:15.6: BAR 13: no space for [io size 0x1000] Jul 10 00:57:30.684143 kernel: pci 0000:00:15.6: BAR 13: failed to assign [io size 0x1000] Jul 10 00:57:30.684192 kernel: pci 0000:00:15.7: BAR 13: no space for [io size 0x1000] Jul 10 00:57:30.684255 kernel: pci 0000:00:15.7: BAR 13: failed to assign [io size 0x1000] Jul 10 00:57:30.684311 kernel: pci 0000:00:16.3: BAR 13: no space for [io size 0x1000] Jul 10 00:57:30.684372 kernel: pci 0000:00:16.3: BAR 13: failed to assign [io size 0x1000] Jul 10 00:57:30.684430 kernel: pci 0000:00:16.4: BAR 13: no space for [io size 0x1000] Jul 10 00:57:30.684486 kernel: pci 0000:00:16.4: BAR 13: failed to assign [io size 0x1000] Jul 10 00:57:30.684551 kernel: pci 0000:00:16.5: BAR 13: no space for [io size 0x1000] Jul 10 00:57:30.684601 kernel: pci 0000:00:16.5: BAR 13: failed to assign [io size 0x1000] Jul 10 00:57:30.684661 kernel: pci 0000:00:16.6: BAR 13: no space for [io size 0x1000] Jul 10 00:57:30.684728 kernel: pci 0000:00:16.6: BAR 13: failed to assign [io size 0x1000] Jul 10 00:57:30.684801 kernel: pci 0000:00:16.7: BAR 13: no space for [io size 0x1000] Jul 10 00:57:30.684873 kernel: pci 0000:00:16.7: BAR 13: failed to assign [io size 0x1000] Jul 10 00:57:30.684933 kernel: pci 0000:00:17.3: BAR 13: no space for [io size 0x1000] Jul 10 00:57:30.684993 kernel: pci 0000:00:17.3: BAR 13: failed to assign [io size 0x1000] Jul 10 00:57:30.685049 kernel: pci 0000:00:17.4: BAR 13: no space for [io size 0x1000] Jul 10 00:57:30.685111 kernel: pci 0000:00:17.4: BAR 13: failed to assign [io size 0x1000] Jul 10 00:57:30.685173 kernel: pci 0000:00:17.5: BAR 13: no space for [io size 0x1000] Jul 10 00:57:30.685231 kernel: pci 0000:00:17.5: BAR 13: failed to assign [io size 0x1000] Jul 10 00:57:30.685288 kernel: pci 0000:00:17.6: BAR 13: no space for [io size 0x1000] Jul 10 00:57:30.685350 kernel: pci 0000:00:17.6: BAR 13: failed to assign [io size 0x1000] Jul 10 00:57:30.685411 kernel: pci 0000:00:17.7: BAR 13: no space for [io size 0x1000] Jul 10 00:57:30.685490 kernel: pci 0000:00:17.7: BAR 13: failed to assign [io size 0x1000] Jul 10 00:57:30.685569 kernel: pci 0000:00:18.2: BAR 13: no space for [io size 0x1000] Jul 10 00:57:30.685655 kernel: pci 0000:00:18.2: BAR 13: failed to assign [io size 0x1000] Jul 10 00:57:30.685728 kernel: pci 0000:00:18.3: BAR 13: no space for [io size 0x1000] Jul 10 00:57:30.687467 kernel: pci 0000:00:18.3: BAR 13: failed to assign [io size 0x1000] Jul 10 00:57:30.687531 kernel: pci 0000:00:18.4: BAR 13: no space for [io size 0x1000] Jul 10 00:57:30.687582 kernel: pci 0000:00:18.4: BAR 13: failed to assign [io size 0x1000] Jul 10 00:57:30.687637 kernel: pci 0000:00:18.5: BAR 13: no space for [io size 0x1000] Jul 10 00:57:30.687698 kernel: pci 0000:00:18.5: BAR 13: failed to assign [io size 0x1000] Jul 10 00:57:30.687764 kernel: pci 0000:00:18.6: BAR 13: no space for [io size 0x1000] Jul 10 00:57:30.687820 kernel: pci 0000:00:18.6: BAR 13: failed to assign [io size 0x1000] Jul 10 00:57:30.687869 kernel: pci 0000:00:18.7: BAR 13: no space for [io size 0x1000] Jul 10 00:57:30.687919 kernel: pci 0000:00:18.7: BAR 13: failed to assign [io size 0x1000] Jul 10 00:57:30.687967 kernel: pci 0000:00:18.7: BAR 13: no space for [io size 0x1000] Jul 10 00:57:30.688015 kernel: pci 0000:00:18.7: BAR 13: failed to assign [io size 0x1000] Jul 10 00:57:30.688064 kernel: pci 0000:00:18.6: BAR 13: no space for [io size 0x1000] Jul 10 00:57:30.688117 kernel: pci 0000:00:18.6: BAR 13: failed to assign [io size 0x1000] Jul 10 00:57:30.688165 kernel: pci 0000:00:18.5: BAR 13: no space for [io size 0x1000] Jul 10 00:57:30.688216 kernel: pci 0000:00:18.5: BAR 13: failed to assign [io size 0x1000] Jul 10 00:57:30.688277 kernel: pci 0000:00:18.4: BAR 13: no space for [io size 0x1000] Jul 10 00:57:30.688334 kernel: pci 0000:00:18.4: BAR 13: failed to assign [io size 0x1000] Jul 10 00:57:30.688387 kernel: pci 0000:00:18.3: BAR 13: no space for [io size 0x1000] Jul 10 00:57:30.688447 kernel: pci 0000:00:18.3: BAR 13: failed to assign [io size 0x1000] Jul 10 00:57:30.688508 kernel: pci 0000:00:18.2: BAR 13: no space for [io size 0x1000] Jul 10 00:57:30.688569 kernel: pci 0000:00:18.2: BAR 13: failed to assign [io size 0x1000] Jul 10 00:57:30.688623 kernel: pci 0000:00:17.7: BAR 13: no space for [io size 0x1000] Jul 10 00:57:30.688672 kernel: pci 0000:00:17.7: BAR 13: failed to assign [io size 0x1000] Jul 10 00:57:30.688721 kernel: pci 0000:00:17.6: BAR 13: no space for [io size 0x1000] Jul 10 00:57:30.688779 kernel: pci 0000:00:17.6: BAR 13: failed to assign [io size 0x1000] Jul 10 00:57:30.688828 kernel: pci 0000:00:17.5: BAR 13: no space for [io size 0x1000] Jul 10 00:57:30.688875 kernel: pci 0000:00:17.5: BAR 13: failed to assign [io size 0x1000] Jul 10 00:57:30.688926 kernel: pci 0000:00:17.4: BAR 13: no space for [io size 0x1000] Jul 10 00:57:30.688977 kernel: pci 0000:00:17.4: BAR 13: failed to assign [io size 0x1000] Jul 10 00:57:30.689025 kernel: pci 0000:00:17.3: BAR 13: no space for [io size 0x1000] Jul 10 00:57:30.689078 kernel: pci 0000:00:17.3: BAR 13: failed to assign [io size 0x1000] Jul 10 00:57:30.689149 kernel: pci 0000:00:16.7: BAR 13: no space for [io size 0x1000] Jul 10 00:57:30.689218 kernel: pci 0000:00:16.7: BAR 13: failed to assign [io size 0x1000] Jul 10 00:57:30.689287 kernel: pci 0000:00:16.6: BAR 13: no space for [io size 0x1000] Jul 10 00:57:30.689343 kernel: pci 0000:00:16.6: BAR 13: failed to assign [io size 0x1000] Jul 10 00:57:30.689403 kernel: pci 0000:00:16.5: BAR 13: no space for [io size 0x1000] Jul 10 00:57:30.689461 kernel: pci 0000:00:16.5: BAR 13: failed to assign [io size 0x1000] Jul 10 00:57:30.689512 kernel: pci 0000:00:16.4: BAR 13: no space for [io size 0x1000] Jul 10 00:57:30.689560 kernel: pci 0000:00:16.4: BAR 13: failed to assign [io size 0x1000] Jul 10 00:57:30.689608 kernel: pci 0000:00:16.3: BAR 13: no space for [io size 0x1000] Jul 10 00:57:30.689657 kernel: pci 0000:00:16.3: BAR 13: failed to assign [io size 0x1000] Jul 10 00:57:30.689704 kernel: pci 0000:00:15.7: BAR 13: no space for [io size 0x1000] Jul 10 00:57:30.689758 kernel: pci 0000:00:15.7: BAR 13: failed to assign [io size 0x1000] Jul 10 00:57:30.689815 kernel: pci 0000:00:15.6: BAR 13: no space for [io size 0x1000] Jul 10 00:57:30.689863 kernel: pci 0000:00:15.6: BAR 13: failed to assign [io size 0x1000] Jul 10 00:57:30.689912 kernel: pci 0000:00:15.5: BAR 13: no space for [io size 0x1000] Jul 10 00:57:30.689960 kernel: pci 0000:00:15.5: BAR 13: failed to assign [io size 0x1000] Jul 10 00:57:30.690012 kernel: pci 0000:00:15.4: BAR 13: no space for [io size 0x1000] Jul 10 00:57:30.690066 kernel: pci 0000:00:15.4: BAR 13: failed to assign [io size 0x1000] Jul 10 00:57:30.690123 kernel: pci 0000:00:15.3: BAR 13: no space for [io size 0x1000] Jul 10 00:57:30.690179 kernel: pci 0000:00:15.3: BAR 13: failed to assign [io size 0x1000] Jul 10 00:57:30.690234 kernel: pci 0000:00:01.0: PCI bridge to [bus 01] Jul 10 00:57:30.690287 kernel: pci 0000:00:11.0: PCI bridge to [bus 02] Jul 10 00:57:30.690335 kernel: pci 0000:00:11.0: bridge window [io 0x2000-0x3fff] Jul 10 00:57:30.690382 kernel: pci 0000:00:11.0: bridge window [mem 0xfd600000-0xfdffffff] Jul 10 00:57:30.690430 kernel: pci 0000:00:11.0: bridge window [mem 0xe7b00000-0xe7ffffff 64bit pref] Jul 10 00:57:30.690483 kernel: pci 0000:03:00.0: BAR 6: assigned [mem 0xfd500000-0xfd50ffff pref] Jul 10 00:57:30.690534 kernel: pci 0000:00:15.0: PCI bridge to [bus 03] Jul 10 00:57:30.690582 kernel: pci 0000:00:15.0: bridge window [io 0x4000-0x4fff] Jul 10 00:57:30.690630 kernel: pci 0000:00:15.0: bridge window [mem 0xfd500000-0xfd5fffff] Jul 10 00:57:30.690686 kernel: pci 0000:00:15.0: bridge window [mem 0xc0000000-0xc01fffff 64bit pref] Jul 10 00:57:30.690742 kernel: pci 0000:00:15.1: PCI bridge to [bus 04] Jul 10 00:57:30.690796 kernel: pci 0000:00:15.1: bridge window [io 0x8000-0x8fff] Jul 10 00:57:30.690854 kernel: pci 0000:00:15.1: bridge window [mem 0xfd100000-0xfd1fffff] Jul 10 00:57:30.691310 kernel: pci 0000:00:15.1: bridge window [mem 0xe7800000-0xe78fffff 64bit pref] Jul 10 00:57:30.691375 kernel: pci 0000:00:15.2: PCI bridge to [bus 05] Jul 10 00:57:30.691433 kernel: pci 0000:00:15.2: bridge window [io 0xc000-0xcfff] Jul 10 00:57:30.691483 kernel: pci 0000:00:15.2: bridge window [mem 0xfcd00000-0xfcdfffff] Jul 10 00:57:30.691540 kernel: pci 0000:00:15.2: bridge window [mem 0xe7400000-0xe74fffff 64bit pref] Jul 10 00:57:30.691593 kernel: pci 0000:00:15.3: PCI bridge to [bus 06] Jul 10 00:57:30.691643 kernel: pci 0000:00:15.3: bridge window [mem 0xfc900000-0xfc9fffff] Jul 10 00:57:30.691692 kernel: pci 0000:00:15.3: bridge window [mem 0xe7000000-0xe70fffff 64bit pref] Jul 10 00:57:30.691793 kernel: pci 0000:00:15.4: PCI bridge to [bus 07] Jul 10 00:57:30.691844 kernel: pci 0000:00:15.4: bridge window [mem 0xfc500000-0xfc5fffff] Jul 10 00:57:30.691892 kernel: pci 0000:00:15.4: bridge window [mem 0xe6c00000-0xe6cfffff 64bit pref] Jul 10 00:57:30.691942 kernel: pci 0000:00:15.5: PCI bridge to [bus 08] Jul 10 00:57:30.691990 kernel: pci 0000:00:15.5: bridge window [mem 0xfc100000-0xfc1fffff] Jul 10 00:57:30.692334 kernel: pci 0000:00:15.5: bridge window [mem 0xe6800000-0xe68fffff 64bit pref] Jul 10 00:57:30.692388 kernel: pci 0000:00:15.6: PCI bridge to [bus 09] Jul 10 00:57:30.692455 kernel: pci 0000:00:15.6: bridge window [mem 0xfbd00000-0xfbdfffff] Jul 10 00:57:30.692518 kernel: pci 0000:00:15.6: bridge window [mem 0xe6400000-0xe64fffff 64bit pref] Jul 10 00:57:30.692576 kernel: pci 0000:00:15.7: PCI bridge to [bus 0a] Jul 10 00:57:30.692634 kernel: pci 0000:00:15.7: bridge window [mem 0xfb900000-0xfb9fffff] Jul 10 00:57:30.692709 kernel: pci 0000:00:15.7: bridge window [mem 0xe6000000-0xe60fffff 64bit pref] Jul 10 00:57:30.692792 kernel: pci 0000:0b:00.0: BAR 6: assigned [mem 0xfd400000-0xfd40ffff pref] Jul 10 00:57:30.692857 kernel: pci 0000:00:16.0: PCI bridge to [bus 0b] Jul 10 00:57:30.692907 kernel: pci 0000:00:16.0: bridge window [io 0x5000-0x5fff] Jul 10 00:57:30.692956 kernel: pci 0000:00:16.0: bridge window [mem 0xfd400000-0xfd4fffff] Jul 10 00:57:30.693004 kernel: pci 0000:00:16.0: bridge window [mem 0xc0200000-0xc03fffff 64bit pref] Jul 10 00:57:30.693059 kernel: pci 0000:00:16.1: PCI bridge to [bus 0c] Jul 10 00:57:30.693108 kernel: pci 0000:00:16.1: bridge window [io 0x9000-0x9fff] Jul 10 00:57:30.693156 kernel: pci 0000:00:16.1: bridge window [mem 0xfd000000-0xfd0fffff] Jul 10 00:57:30.693207 kernel: pci 0000:00:16.1: bridge window [mem 0xe7700000-0xe77fffff 64bit pref] Jul 10 00:57:30.693270 kernel: pci 0000:00:16.2: PCI bridge to [bus 0d] Jul 10 00:57:30.693330 kernel: pci 0000:00:16.2: bridge window [io 0xd000-0xdfff] Jul 10 00:57:30.693395 kernel: pci 0000:00:16.2: bridge window [mem 0xfcc00000-0xfccfffff] Jul 10 00:57:30.693451 kernel: pci 0000:00:16.2: bridge window [mem 0xe7300000-0xe73fffff 64bit pref] Jul 10 00:57:30.693504 kernel: pci 0000:00:16.3: PCI bridge to [bus 0e] Jul 10 00:57:30.693563 kernel: pci 0000:00:16.3: bridge window [mem 0xfc800000-0xfc8fffff] Jul 10 00:57:30.693619 kernel: pci 0000:00:16.3: bridge window [mem 0xe6f00000-0xe6ffffff 64bit pref] Jul 10 00:57:30.693668 kernel: pci 0000:00:16.4: PCI bridge to [bus 0f] Jul 10 00:57:30.693722 kernel: pci 0000:00:16.4: bridge window [mem 0xfc400000-0xfc4fffff] Jul 10 00:57:30.693805 kernel: pci 0000:00:16.4: bridge window [mem 0xe6b00000-0xe6bfffff 64bit pref] Jul 10 00:57:30.693877 kernel: pci 0000:00:16.5: PCI bridge to [bus 10] Jul 10 00:57:30.693938 kernel: pci 0000:00:16.5: bridge window [mem 0xfc000000-0xfc0fffff] Jul 10 00:57:30.694294 kernel: pci 0000:00:16.5: bridge window [mem 0xe6700000-0xe67fffff 64bit pref] Jul 10 00:57:30.694351 kernel: pci 0000:00:16.6: PCI bridge to [bus 11] Jul 10 00:57:30.694407 kernel: pci 0000:00:16.6: bridge window [mem 0xfbc00000-0xfbcfffff] Jul 10 00:57:30.694457 kernel: pci 0000:00:16.6: bridge window [mem 0xe6300000-0xe63fffff 64bit pref] Jul 10 00:57:30.694506 kernel: pci 0000:00:16.7: PCI bridge to [bus 12] Jul 10 00:57:30.694555 kernel: pci 0000:00:16.7: bridge window [mem 0xfb800000-0xfb8fffff] Jul 10 00:57:30.694604 kernel: pci 0000:00:16.7: bridge window [mem 0xe5f00000-0xe5ffffff 64bit pref] Jul 10 00:57:30.694653 kernel: pci 0000:00:17.0: PCI bridge to [bus 13] Jul 10 00:57:30.694705 kernel: pci 0000:00:17.0: bridge window [io 0x6000-0x6fff] Jul 10 00:57:30.694768 kernel: pci 0000:00:17.0: bridge window [mem 0xfd300000-0xfd3fffff] Jul 10 00:57:30.694818 kernel: pci 0000:00:17.0: bridge window [mem 0xe7a00000-0xe7afffff 64bit pref] Jul 10 00:57:30.694877 kernel: pci 0000:00:17.1: PCI bridge to [bus 14] Jul 10 00:57:30.694943 kernel: pci 0000:00:17.1: bridge window [io 0xa000-0xafff] Jul 10 00:57:30.696329 kernel: pci 0000:00:17.1: bridge window [mem 0xfcf00000-0xfcffffff] Jul 10 00:57:30.696635 kernel: pci 0000:00:17.1: bridge window [mem 0xe7600000-0xe76fffff 64bit pref] Jul 10 00:57:30.696694 kernel: pci 0000:00:17.2: PCI bridge to [bus 15] Jul 10 00:57:30.696818 kernel: pci 0000:00:17.2: bridge window [io 0xe000-0xefff] Jul 10 00:57:30.697195 kernel: pci 0000:00:17.2: bridge window [mem 0xfcb00000-0xfcbfffff] Jul 10 00:57:30.697262 kernel: pci 0000:00:17.2: bridge window [mem 0xe7200000-0xe72fffff 64bit pref] Jul 10 00:57:30.697316 kernel: pci 0000:00:17.3: PCI bridge to [bus 16] Jul 10 00:57:30.697366 kernel: pci 0000:00:17.3: bridge window [mem 0xfc700000-0xfc7fffff] Jul 10 00:57:30.697415 kernel: pci 0000:00:17.3: bridge window [mem 0xe6e00000-0xe6efffff 64bit pref] Jul 10 00:57:30.697466 kernel: pci 0000:00:17.4: PCI bridge to [bus 17] Jul 10 00:57:30.697519 kernel: pci 0000:00:17.4: bridge window [mem 0xfc300000-0xfc3fffff] Jul 10 00:57:30.697569 kernel: pci 0000:00:17.4: bridge window [mem 0xe6a00000-0xe6afffff 64bit pref] Jul 10 00:57:30.697618 kernel: pci 0000:00:17.5: PCI bridge to [bus 18] Jul 10 00:57:30.697667 kernel: pci 0000:00:17.5: bridge window [mem 0xfbf00000-0xfbffffff] Jul 10 00:57:30.697719 kernel: pci 0000:00:17.5: bridge window [mem 0xe6600000-0xe66fffff 64bit pref] Jul 10 00:57:30.697805 kernel: pci 0000:00:17.6: PCI bridge to [bus 19] Jul 10 00:57:30.698188 kernel: pci 0000:00:17.6: bridge window [mem 0xfbb00000-0xfbbfffff] Jul 10 00:57:30.698254 kernel: pci 0000:00:17.6: bridge window [mem 0xe6200000-0xe62fffff 64bit pref] Jul 10 00:57:30.698324 kernel: pci 0000:00:17.7: PCI bridge to [bus 1a] Jul 10 00:57:30.698701 kernel: pci 0000:00:17.7: bridge window [mem 0xfb700000-0xfb7fffff] Jul 10 00:57:30.698778 kernel: pci 0000:00:17.7: bridge window [mem 0xe5e00000-0xe5efffff 64bit pref] Jul 10 00:57:30.701152 kernel: pci 0000:00:18.0: PCI bridge to [bus 1b] Jul 10 00:57:30.701256 kernel: pci 0000:00:18.0: bridge window [io 0x7000-0x7fff] Jul 10 00:57:30.701318 kernel: pci 0000:00:18.0: bridge window [mem 0xfd200000-0xfd2fffff] Jul 10 00:57:30.701387 kernel: pci 0000:00:18.0: bridge window [mem 0xe7900000-0xe79fffff 64bit pref] Jul 10 00:57:30.701448 kernel: pci 0000:00:18.1: PCI bridge to [bus 1c] Jul 10 00:57:30.701501 kernel: pci 0000:00:18.1: bridge window [io 0xb000-0xbfff] Jul 10 00:57:30.701560 kernel: pci 0000:00:18.1: bridge window [mem 0xfce00000-0xfcefffff] Jul 10 00:57:30.701614 kernel: pci 0000:00:18.1: bridge window [mem 0xe7500000-0xe75fffff 64bit pref] Jul 10 00:57:30.701668 kernel: pci 0000:00:18.2: PCI bridge to [bus 1d] Jul 10 00:57:30.701722 kernel: pci 0000:00:18.2: bridge window [mem 0xfca00000-0xfcafffff] Jul 10 00:57:30.701814 kernel: pci 0000:00:18.2: bridge window [mem 0xe7100000-0xe71fffff 64bit pref] Jul 10 00:57:30.701869 kernel: pci 0000:00:18.3: PCI bridge to [bus 1e] Jul 10 00:57:30.701925 kernel: pci 0000:00:18.3: bridge window [mem 0xfc600000-0xfc6fffff] Jul 10 00:57:30.701976 kernel: pci 0000:00:18.3: bridge window [mem 0xe6d00000-0xe6dfffff 64bit pref] Jul 10 00:57:30.704494 kernel: pci 0000:00:18.4: PCI bridge to [bus 1f] Jul 10 00:57:30.704570 kernel: pci 0000:00:18.4: bridge window [mem 0xfc200000-0xfc2fffff] Jul 10 00:57:30.704645 kernel: pci 0000:00:18.4: bridge window [mem 0xe6900000-0xe69fffff 64bit pref] Jul 10 00:57:30.704709 kernel: pci 0000:00:18.5: PCI bridge to [bus 20] Jul 10 00:57:30.704772 kernel: pci 0000:00:18.5: bridge window [mem 0xfbe00000-0xfbefffff] Jul 10 00:57:30.704825 kernel: pci 0000:00:18.5: bridge window [mem 0xe6500000-0xe65fffff 64bit pref] Jul 10 00:57:30.704879 kernel: pci 0000:00:18.6: PCI bridge to [bus 21] Jul 10 00:57:30.704943 kernel: pci 0000:00:18.6: bridge window [mem 0xfba00000-0xfbafffff] Jul 10 00:57:30.705009 kernel: pci 0000:00:18.6: bridge window [mem 0xe6100000-0xe61fffff 64bit pref] Jul 10 00:57:30.705072 kernel: pci 0000:00:18.7: PCI bridge to [bus 22] Jul 10 00:57:30.705137 kernel: pci 0000:00:18.7: bridge window [mem 0xfb600000-0xfb6fffff] Jul 10 00:57:30.705200 kernel: pci 0000:00:18.7: bridge window [mem 0xe5d00000-0xe5dfffff 64bit pref] Jul 10 00:57:30.705254 kernel: pci_bus 0000:00: resource 4 [mem 0x000a0000-0x000bffff window] Jul 10 00:57:30.705303 kernel: pci_bus 0000:00: resource 5 [mem 0x000cc000-0x000dbfff window] Jul 10 00:57:30.705351 kernel: pci_bus 0000:00: resource 6 [mem 0xc0000000-0xfebfffff window] Jul 10 00:57:30.705399 kernel: pci_bus 0000:00: resource 7 [io 0x0000-0x0cf7 window] Jul 10 00:57:30.705449 kernel: pci_bus 0000:00: resource 8 [io 0x0d00-0xfeff window] Jul 10 00:57:30.705506 kernel: pci_bus 0000:02: resource 0 [io 0x2000-0x3fff] Jul 10 00:57:30.708710 kernel: pci_bus 0000:02: resource 1 [mem 0xfd600000-0xfdffffff] Jul 10 00:57:30.708818 kernel: pci_bus 0000:02: resource 2 [mem 0xe7b00000-0xe7ffffff 64bit pref] Jul 10 00:57:30.708873 kernel: pci_bus 0000:02: resource 4 [mem 0x000a0000-0x000bffff window] Jul 10 00:57:30.708920 kernel: pci_bus 0000:02: resource 5 [mem 0x000cc000-0x000dbfff window] Jul 10 00:57:30.708972 kernel: pci_bus 0000:02: resource 6 [mem 0xc0000000-0xfebfffff window] Jul 10 00:57:30.709021 kernel: pci_bus 0000:02: resource 7 [io 0x0000-0x0cf7 window] Jul 10 00:57:30.709065 kernel: pci_bus 0000:02: resource 8 [io 0x0d00-0xfeff window] Jul 10 00:57:30.709116 kernel: pci_bus 0000:03: resource 0 [io 0x4000-0x4fff] Jul 10 00:57:30.709164 kernel: pci_bus 0000:03: resource 1 [mem 0xfd500000-0xfd5fffff] Jul 10 00:57:30.709209 kernel: pci_bus 0000:03: resource 2 [mem 0xc0000000-0xc01fffff 64bit pref] Jul 10 00:57:30.709263 kernel: pci_bus 0000:04: resource 0 [io 0x8000-0x8fff] Jul 10 00:57:30.709310 kernel: pci_bus 0000:04: resource 1 [mem 0xfd100000-0xfd1fffff] Jul 10 00:57:30.709358 kernel: pci_bus 0000:04: resource 2 [mem 0xe7800000-0xe78fffff 64bit pref] Jul 10 00:57:30.709409 kernel: pci_bus 0000:05: resource 0 [io 0xc000-0xcfff] Jul 10 00:57:30.709455 kernel: pci_bus 0000:05: resource 1 [mem 0xfcd00000-0xfcdfffff] Jul 10 00:57:30.709500 kernel: pci_bus 0000:05: resource 2 [mem 0xe7400000-0xe74fffff 64bit pref] Jul 10 00:57:30.709550 kernel: pci_bus 0000:06: resource 1 [mem 0xfc900000-0xfc9fffff] Jul 10 00:57:30.709595 kernel: pci_bus 0000:06: resource 2 [mem 0xe7000000-0xe70fffff 64bit pref] Jul 10 00:57:30.709650 kernel: pci_bus 0000:07: resource 1 [mem 0xfc500000-0xfc5fffff] Jul 10 00:57:30.709707 kernel: pci_bus 0000:07: resource 2 [mem 0xe6c00000-0xe6cfffff 64bit pref] Jul 10 00:57:30.709833 kernel: pci_bus 0000:08: resource 1 [mem 0xfc100000-0xfc1fffff] Jul 10 00:57:30.709882 kernel: pci_bus 0000:08: resource 2 [mem 0xe6800000-0xe68fffff 64bit pref] Jul 10 00:57:30.709931 kernel: pci_bus 0000:09: resource 1 [mem 0xfbd00000-0xfbdfffff] Jul 10 00:57:30.709977 kernel: pci_bus 0000:09: resource 2 [mem 0xe6400000-0xe64fffff 64bit pref] Jul 10 00:57:30.710028 kernel: pci_bus 0000:0a: resource 1 [mem 0xfb900000-0xfb9fffff] Jul 10 00:57:30.710078 kernel: pci_bus 0000:0a: resource 2 [mem 0xe6000000-0xe60fffff 64bit pref] Jul 10 00:57:30.710338 kernel: pci_bus 0000:0b: resource 0 [io 0x5000-0x5fff] Jul 10 00:57:30.710408 kernel: pci_bus 0000:0b: resource 1 [mem 0xfd400000-0xfd4fffff] Jul 10 00:57:30.710479 kernel: pci_bus 0000:0b: resource 2 [mem 0xc0200000-0xc03fffff 64bit pref] Jul 10 00:57:30.710535 kernel: pci_bus 0000:0c: resource 0 [io 0x9000-0x9fff] Jul 10 00:57:30.710585 kernel: pci_bus 0000:0c: resource 1 [mem 0xfd000000-0xfd0fffff] Jul 10 00:57:30.710633 kernel: pci_bus 0000:0c: resource 2 [mem 0xe7700000-0xe77fffff 64bit pref] Jul 10 00:57:30.710694 kernel: pci_bus 0000:0d: resource 0 [io 0xd000-0xdfff] Jul 10 00:57:30.710749 kernel: pci_bus 0000:0d: resource 1 [mem 0xfcc00000-0xfccfffff] Jul 10 00:57:30.710794 kernel: pci_bus 0000:0d: resource 2 [mem 0xe7300000-0xe73fffff 64bit pref] Jul 10 00:57:30.710844 kernel: pci_bus 0000:0e: resource 1 [mem 0xfc800000-0xfc8fffff] Jul 10 00:57:30.710891 kernel: pci_bus 0000:0e: resource 2 [mem 0xe6f00000-0xe6ffffff 64bit pref] Jul 10 00:57:30.710943 kernel: pci_bus 0000:0f: resource 1 [mem 0xfc400000-0xfc4fffff] Jul 10 00:57:30.710993 kernel: pci_bus 0000:0f: resource 2 [mem 0xe6b00000-0xe6bfffff 64bit pref] Jul 10 00:57:30.711043 kernel: pci_bus 0000:10: resource 1 [mem 0xfc000000-0xfc0fffff] Jul 10 00:57:30.711089 kernel: pci_bus 0000:10: resource 2 [mem 0xe6700000-0xe67fffff 64bit pref] Jul 10 00:57:30.711146 kernel: pci_bus 0000:11: resource 1 [mem 0xfbc00000-0xfbcfffff] Jul 10 00:57:30.714717 kernel: pci_bus 0000:11: resource 2 [mem 0xe6300000-0xe63fffff 64bit pref] Jul 10 00:57:30.714792 kernel: pci_bus 0000:12: resource 1 [mem 0xfb800000-0xfb8fffff] Jul 10 00:57:30.714846 kernel: pci_bus 0000:12: resource 2 [mem 0xe5f00000-0xe5ffffff 64bit pref] Jul 10 00:57:30.714896 kernel: pci_bus 0000:13: resource 0 [io 0x6000-0x6fff] Jul 10 00:57:30.714943 kernel: pci_bus 0000:13: resource 1 [mem 0xfd300000-0xfd3fffff] Jul 10 00:57:30.714989 kernel: pci_bus 0000:13: resource 2 [mem 0xe7a00000-0xe7afffff 64bit pref] Jul 10 00:57:30.715039 kernel: pci_bus 0000:14: resource 0 [io 0xa000-0xafff] Jul 10 00:57:30.715090 kernel: pci_bus 0000:14: resource 1 [mem 0xfcf00000-0xfcffffff] Jul 10 00:57:30.715137 kernel: pci_bus 0000:14: resource 2 [mem 0xe7600000-0xe76fffff 64bit pref] Jul 10 00:57:30.715194 kernel: pci_bus 0000:15: resource 0 [io 0xe000-0xefff] Jul 10 00:57:30.715260 kernel: pci_bus 0000:15: resource 1 [mem 0xfcb00000-0xfcbfffff] Jul 10 00:57:30.715329 kernel: pci_bus 0000:15: resource 2 [mem 0xe7200000-0xe72fffff 64bit pref] Jul 10 00:57:30.715391 kernel: pci_bus 0000:16: resource 1 [mem 0xfc700000-0xfc7fffff] Jul 10 00:57:30.715453 kernel: pci_bus 0000:16: resource 2 [mem 0xe6e00000-0xe6efffff 64bit pref] Jul 10 00:57:30.715511 kernel: pci_bus 0000:17: resource 1 [mem 0xfc300000-0xfc3fffff] Jul 10 00:57:30.715560 kernel: pci_bus 0000:17: resource 2 [mem 0xe6a00000-0xe6afffff 64bit pref] Jul 10 00:57:30.715612 kernel: pci_bus 0000:18: resource 1 [mem 0xfbf00000-0xfbffffff] Jul 10 00:57:30.715658 kernel: pci_bus 0000:18: resource 2 [mem 0xe6600000-0xe66fffff 64bit pref] Jul 10 00:57:30.715708 kernel: pci_bus 0000:19: resource 1 [mem 0xfbb00000-0xfbbfffff] Jul 10 00:57:30.715760 kernel: pci_bus 0000:19: resource 2 [mem 0xe6200000-0xe62fffff 64bit pref] Jul 10 00:57:30.715812 kernel: pci_bus 0000:1a: resource 1 [mem 0xfb700000-0xfb7fffff] Jul 10 00:57:30.715860 kernel: pci_bus 0000:1a: resource 2 [mem 0xe5e00000-0xe5efffff 64bit pref] Jul 10 00:57:30.715914 kernel: pci_bus 0000:1b: resource 0 [io 0x7000-0x7fff] Jul 10 00:57:30.715960 kernel: pci_bus 0000:1b: resource 1 [mem 0xfd200000-0xfd2fffff] Jul 10 00:57:30.716005 kernel: pci_bus 0000:1b: resource 2 [mem 0xe7900000-0xe79fffff 64bit pref] Jul 10 00:57:30.716067 kernel: pci_bus 0000:1c: resource 0 [io 0xb000-0xbfff] Jul 10 00:57:30.716140 kernel: pci_bus 0000:1c: resource 1 [mem 0xfce00000-0xfcefffff] Jul 10 00:57:30.716195 kernel: pci_bus 0000:1c: resource 2 [mem 0xe7500000-0xe75fffff 64bit pref] Jul 10 00:57:30.716262 kernel: pci_bus 0000:1d: resource 1 [mem 0xfca00000-0xfcafffff] Jul 10 00:57:30.716314 kernel: pci_bus 0000:1d: resource 2 [mem 0xe7100000-0xe71fffff 64bit pref] Jul 10 00:57:30.716629 kernel: pci_bus 0000:1e: resource 1 [mem 0xfc600000-0xfc6fffff] Jul 10 00:57:30.716685 kernel: pci_bus 0000:1e: resource 2 [mem 0xe6d00000-0xe6dfffff 64bit pref] Jul 10 00:57:30.716750 kernel: pci_bus 0000:1f: resource 1 [mem 0xfc200000-0xfc2fffff] Jul 10 00:57:30.716809 kernel: pci_bus 0000:1f: resource 2 [mem 0xe6900000-0xe69fffff 64bit pref] Jul 10 00:57:30.716879 kernel: pci_bus 0000:20: resource 1 [mem 0xfbe00000-0xfbefffff] Jul 10 00:57:30.716945 kernel: pci_bus 0000:20: resource 2 [mem 0xe6500000-0xe65fffff 64bit pref] Jul 10 00:57:30.717028 kernel: pci_bus 0000:21: resource 1 [mem 0xfba00000-0xfbafffff] Jul 10 00:57:30.717097 kernel: pci_bus 0000:21: resource 2 [mem 0xe6100000-0xe61fffff 64bit pref] Jul 10 00:57:30.717167 kernel: pci_bus 0000:22: resource 1 [mem 0xfb600000-0xfb6fffff] Jul 10 00:57:30.717218 kernel: pci_bus 0000:22: resource 2 [mem 0xe5d00000-0xe5dfffff 64bit pref] Jul 10 00:57:30.717275 kernel: pci 0000:00:00.0: Limiting direct PCI/PCI transfers Jul 10 00:57:30.717285 kernel: PCI: CLS 32 bytes, default 64 Jul 10 00:57:30.717292 kernel: RAPL PMU: API unit is 2^-32 Joules, 0 fixed counters, 10737418240 ms ovfl timer Jul 10 00:57:30.717299 kernel: clocksource: tsc: mask: 0xffffffffffffffff max_cycles: 0x311fd3cd494, max_idle_ns: 440795223879 ns Jul 10 00:57:30.717305 kernel: clocksource: Switched to clocksource tsc Jul 10 00:57:30.717311 kernel: Initialise system trusted keyrings Jul 10 00:57:30.717318 kernel: workingset: timestamp_bits=39 max_order=19 bucket_order=0 Jul 10 00:57:30.717324 kernel: Key type asymmetric registered Jul 10 00:57:30.717332 kernel: Asymmetric key parser 'x509' registered Jul 10 00:57:30.717339 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Jul 10 00:57:30.717346 kernel: io scheduler mq-deadline registered Jul 10 00:57:30.717352 kernel: io scheduler kyber registered Jul 10 00:57:30.717358 kernel: io scheduler bfq registered Jul 10 00:57:30.717412 kernel: pcieport 0000:00:15.0: PME: Signaling with IRQ 24 Jul 10 00:57:30.717469 kernel: pcieport 0000:00:15.0: pciehp: Slot #160 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Jul 10 00:57:30.717530 kernel: pcieport 0000:00:15.1: PME: Signaling with IRQ 25 Jul 10 00:57:30.717584 kernel: pcieport 0000:00:15.1: pciehp: Slot #161 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Jul 10 00:57:30.717636 kernel: pcieport 0000:00:15.2: PME: Signaling with IRQ 26 Jul 10 00:57:30.717686 kernel: pcieport 0000:00:15.2: pciehp: Slot #162 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Jul 10 00:57:30.717748 kernel: pcieport 0000:00:15.3: PME: Signaling with IRQ 27 Jul 10 00:57:30.717805 kernel: pcieport 0000:00:15.3: pciehp: Slot #163 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Jul 10 00:57:30.717857 kernel: pcieport 0000:00:15.4: PME: Signaling with IRQ 28 Jul 10 00:57:30.717910 kernel: pcieport 0000:00:15.4: pciehp: Slot #164 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Jul 10 00:57:30.717966 kernel: pcieport 0000:00:15.5: PME: Signaling with IRQ 29 Jul 10 00:57:30.718021 kernel: pcieport 0000:00:15.5: pciehp: Slot #165 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Jul 10 00:57:30.718094 kernel: pcieport 0000:00:15.6: PME: Signaling with IRQ 30 Jul 10 00:57:30.718157 kernel: pcieport 0000:00:15.6: pciehp: Slot #166 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Jul 10 00:57:30.718210 kernel: pcieport 0000:00:15.7: PME: Signaling with IRQ 31 Jul 10 00:57:30.718262 kernel: pcieport 0000:00:15.7: pciehp: Slot #167 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Jul 10 00:57:30.718314 kernel: pcieport 0000:00:16.0: PME: Signaling with IRQ 32 Jul 10 00:57:30.718369 kernel: pcieport 0000:00:16.0: pciehp: Slot #192 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Jul 10 00:57:30.718422 kernel: pcieport 0000:00:16.1: PME: Signaling with IRQ 33 Jul 10 00:57:30.718471 kernel: pcieport 0000:00:16.1: pciehp: Slot #193 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Jul 10 00:57:30.718522 kernel: pcieport 0000:00:16.2: PME: Signaling with IRQ 34 Jul 10 00:57:30.718578 kernel: pcieport 0000:00:16.2: pciehp: Slot #194 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Jul 10 00:57:30.718647 kernel: pcieport 0000:00:16.3: PME: Signaling with IRQ 35 Jul 10 00:57:30.718716 kernel: pcieport 0000:00:16.3: pciehp: Slot #195 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Jul 10 00:57:30.719256 kernel: pcieport 0000:00:16.4: PME: Signaling with IRQ 36 Jul 10 00:57:30.719350 kernel: pcieport 0000:00:16.4: pciehp: Slot #196 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Jul 10 00:57:30.719428 kernel: pcieport 0000:00:16.5: PME: Signaling with IRQ 37 Jul 10 00:57:30.719521 kernel: pcieport 0000:00:16.5: pciehp: Slot #197 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Jul 10 00:57:30.719601 kernel: pcieport 0000:00:16.6: PME: Signaling with IRQ 38 Jul 10 00:57:30.720093 kernel: pcieport 0000:00:16.6: pciehp: Slot #198 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Jul 10 00:57:30.720173 kernel: pcieport 0000:00:16.7: PME: Signaling with IRQ 39 Jul 10 00:57:30.720611 kernel: pcieport 0000:00:16.7: pciehp: Slot #199 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Jul 10 00:57:30.720691 kernel: pcieport 0000:00:17.0: PME: Signaling with IRQ 40 Jul 10 00:57:30.720786 kernel: pcieport 0000:00:17.0: pciehp: Slot #224 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Jul 10 00:57:30.720868 kernel: pcieport 0000:00:17.1: PME: Signaling with IRQ 41 Jul 10 00:57:30.720938 kernel: pcieport 0000:00:17.1: pciehp: Slot #225 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Jul 10 00:57:30.721315 kernel: pcieport 0000:00:17.2: PME: Signaling with IRQ 42 Jul 10 00:57:30.721405 kernel: pcieport 0000:00:17.2: pciehp: Slot #226 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Jul 10 00:57:30.721507 kernel: pcieport 0000:00:17.3: PME: Signaling with IRQ 43 Jul 10 00:57:30.721605 kernel: pcieport 0000:00:17.3: pciehp: Slot #227 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Jul 10 00:57:30.721695 kernel: pcieport 0000:00:17.4: PME: Signaling with IRQ 44 Jul 10 00:57:30.721788 kernel: pcieport 0000:00:17.4: pciehp: Slot #228 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Jul 10 00:57:30.721876 kernel: pcieport 0000:00:17.5: PME: Signaling with IRQ 45 Jul 10 00:57:30.721963 kernel: pcieport 0000:00:17.5: pciehp: Slot #229 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Jul 10 00:57:30.722053 kernel: pcieport 0000:00:17.6: PME: Signaling with IRQ 46 Jul 10 00:57:30.722150 kernel: pcieport 0000:00:17.6: pciehp: Slot #230 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Jul 10 00:57:30.722232 kernel: pcieport 0000:00:17.7: PME: Signaling with IRQ 47 Jul 10 00:57:30.722322 kernel: pcieport 0000:00:17.7: pciehp: Slot #231 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Jul 10 00:57:30.722400 kernel: pcieport 0000:00:18.0: PME: Signaling with IRQ 48 Jul 10 00:57:30.722489 kernel: pcieport 0000:00:18.0: pciehp: Slot #256 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Jul 10 00:57:30.722579 kernel: pcieport 0000:00:18.1: PME: Signaling with IRQ 49 Jul 10 00:57:30.722663 kernel: pcieport 0000:00:18.1: pciehp: Slot #257 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Jul 10 00:57:30.722761 kernel: pcieport 0000:00:18.2: PME: Signaling with IRQ 50 Jul 10 00:57:30.722842 kernel: pcieport 0000:00:18.2: pciehp: Slot #258 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Jul 10 00:57:30.722919 kernel: pcieport 0000:00:18.3: PME: Signaling with IRQ 51 Jul 10 00:57:30.723010 kernel: pcieport 0000:00:18.3: pciehp: Slot #259 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Jul 10 00:57:30.723104 kernel: pcieport 0000:00:18.4: PME: Signaling with IRQ 52 Jul 10 00:57:30.723183 kernel: pcieport 0000:00:18.4: pciehp: Slot #260 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Jul 10 00:57:30.723261 kernel: pcieport 0000:00:18.5: PME: Signaling with IRQ 53 Jul 10 00:57:30.723338 kernel: pcieport 0000:00:18.5: pciehp: Slot #261 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Jul 10 00:57:30.723409 kernel: pcieport 0000:00:18.6: PME: Signaling with IRQ 54 Jul 10 00:57:30.723484 kernel: pcieport 0000:00:18.6: pciehp: Slot #262 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Jul 10 00:57:30.723564 kernel: pcieport 0000:00:18.7: PME: Signaling with IRQ 55 Jul 10 00:57:30.723644 kernel: pcieport 0000:00:18.7: pciehp: Slot #263 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Jul 10 00:57:30.723658 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 Jul 10 00:57:30.723667 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Jul 10 00:57:30.723676 kernel: 00:05: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A Jul 10 00:57:30.723685 kernel: i8042: PNP: PS/2 Controller [PNP0303:KBC,PNP0f13:MOUS] at 0x60,0x64 irq 1,12 Jul 10 00:57:30.723695 kernel: serio: i8042 KBD port at 0x60,0x64 irq 1 Jul 10 00:57:30.723704 kernel: serio: i8042 AUX port at 0x60,0x64 irq 12 Jul 10 00:57:30.723796 kernel: rtc_cmos 00:01: registered as rtc0 Jul 10 00:57:30.723875 kernel: rtc_cmos 00:01: setting system clock to 2025-07-10T00:57:30 UTC (1752109050) Jul 10 00:57:30.723950 kernel: rtc_cmos 00:01: alarms up to one month, y3k, 114 bytes nvram Jul 10 00:57:30.723964 kernel: intel_pstate: CPU model not supported Jul 10 00:57:30.723977 kernel: NET: Registered PF_INET6 protocol family Jul 10 00:57:30.723987 kernel: Segment Routing with IPv6 Jul 10 00:57:30.723997 kernel: In-situ OAM (IOAM) with IPv6 Jul 10 00:57:30.724003 kernel: NET: Registered PF_PACKET protocol family Jul 10 00:57:30.724009 kernel: Key type dns_resolver registered Jul 10 00:57:30.724016 kernel: input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input0 Jul 10 00:57:30.724022 kernel: IPI shorthand broadcast: enabled Jul 10 00:57:30.724029 kernel: sched_clock: Marking stable (915182607, 228717267)->(1210066890, -66167016) Jul 10 00:57:30.724038 kernel: registered taskstats version 1 Jul 10 00:57:30.724044 kernel: Loading compiled-in X.509 certificates Jul 10 00:57:30.724053 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.186-flatcar: 6ebecdd7757c0df63fc51731f0b99957f4e4af16' Jul 10 00:57:30.724061 kernel: Key type .fscrypt registered Jul 10 00:57:30.724067 kernel: Key type fscrypt-provisioning registered Jul 10 00:57:30.724074 kernel: ima: No TPM chip found, activating TPM-bypass! Jul 10 00:57:30.724080 kernel: ima: Allocated hash algorithm: sha1 Jul 10 00:57:30.724086 kernel: ima: No architecture policies found Jul 10 00:57:30.724092 kernel: clk: Disabling unused clocks Jul 10 00:57:30.724098 kernel: Freeing unused kernel image (initmem) memory: 47472K Jul 10 00:57:30.724105 kernel: Write protecting the kernel read-only data: 28672k Jul 10 00:57:30.724111 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K Jul 10 00:57:30.724118 kernel: Freeing unused kernel image (rodata/data gap) memory: 612K Jul 10 00:57:30.724125 kernel: Run /init as init process Jul 10 00:57:30.724131 kernel: with arguments: Jul 10 00:57:30.724137 kernel: /init Jul 10 00:57:30.724143 kernel: with environment: Jul 10 00:57:30.724149 kernel: HOME=/ Jul 10 00:57:30.724155 kernel: TERM=linux Jul 10 00:57:30.724161 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Jul 10 00:57:30.724168 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Jul 10 00:57:30.724178 systemd[1]: Detected virtualization vmware. Jul 10 00:57:30.724184 systemd[1]: Detected architecture x86-64. Jul 10 00:57:30.724190 systemd[1]: Running in initrd. Jul 10 00:57:30.724196 systemd[1]: No hostname configured, using default hostname. Jul 10 00:57:30.724202 systemd[1]: Hostname set to . Jul 10 00:57:30.724209 systemd[1]: Initializing machine ID from random generator. Jul 10 00:57:30.724215 systemd[1]: Queued start job for default target initrd.target. Jul 10 00:57:30.724225 systemd[1]: Started systemd-ask-password-console.path. Jul 10 00:57:30.724235 systemd[1]: Reached target cryptsetup.target. Jul 10 00:57:30.724244 systemd[1]: Reached target paths.target. Jul 10 00:57:30.724253 systemd[1]: Reached target slices.target. Jul 10 00:57:30.724260 systemd[1]: Reached target swap.target. Jul 10 00:57:30.724266 systemd[1]: Reached target timers.target. Jul 10 00:57:30.724272 systemd[1]: Listening on iscsid.socket. Jul 10 00:57:30.724279 systemd[1]: Listening on iscsiuio.socket. Jul 10 00:57:30.724286 systemd[1]: Listening on systemd-journald-audit.socket. Jul 10 00:57:30.724293 systemd[1]: Listening on systemd-journald-dev-log.socket. Jul 10 00:57:30.724299 systemd[1]: Listening on systemd-journald.socket. Jul 10 00:57:30.724305 systemd[1]: Listening on systemd-networkd.socket. Jul 10 00:57:30.724312 systemd[1]: Listening on systemd-udevd-control.socket. Jul 10 00:57:30.724318 systemd[1]: Listening on systemd-udevd-kernel.socket. Jul 10 00:57:30.724324 systemd[1]: Reached target sockets.target. Jul 10 00:57:30.724331 systemd[1]: Starting kmod-static-nodes.service... Jul 10 00:57:30.724337 systemd[1]: Finished network-cleanup.service. Jul 10 00:57:30.724345 systemd[1]: Starting systemd-fsck-usr.service... Jul 10 00:57:30.724351 systemd[1]: Starting systemd-journald.service... Jul 10 00:57:30.724357 systemd[1]: Starting systemd-modules-load.service... Jul 10 00:57:30.724364 systemd[1]: Starting systemd-resolved.service... Jul 10 00:57:30.724370 systemd[1]: Starting systemd-vconsole-setup.service... Jul 10 00:57:30.724376 systemd[1]: Finished kmod-static-nodes.service. Jul 10 00:57:30.724382 systemd[1]: Finished systemd-fsck-usr.service. Jul 10 00:57:30.724388 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Jul 10 00:57:30.724395 systemd[1]: Finished systemd-vconsole-setup.service. Jul 10 00:57:30.724403 kernel: audit: type=1130 audit(1752109050.656:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:57:30.724409 systemd[1]: Starting dracut-cmdline-ask.service... Jul 10 00:57:30.724416 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Jul 10 00:57:30.724422 kernel: audit: type=1130 audit(1752109050.679:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:57:30.724429 systemd[1]: Finished dracut-cmdline-ask.service. Jul 10 00:57:30.724435 kernel: audit: type=1130 audit(1752109050.700:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:57:30.724441 systemd[1]: Starting dracut-cmdline.service... Jul 10 00:57:30.724448 systemd[1]: Started systemd-resolved.service. Jul 10 00:57:30.724455 systemd[1]: Reached target nss-lookup.target. Jul 10 00:57:30.724462 kernel: audit: type=1130 audit(1752109050.709:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:57:30.724468 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Jul 10 00:57:30.724474 kernel: Bridge firewalling registered Jul 10 00:57:30.724485 systemd-journald[217]: Journal started Jul 10 00:57:30.724519 systemd-journald[217]: Runtime Journal (/run/log/journal/2a61f071fc984402937af1221ae58e99) is 4.8M, max 38.8M, 34.0M free. Jul 10 00:57:30.656000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:57:30.679000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:57:30.700000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:57:30.709000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:57:30.656492 systemd-modules-load[218]: Inserted module 'overlay' Jul 10 00:57:30.706015 systemd-resolved[219]: Positive Trust Anchors: Jul 10 00:57:30.728898 systemd[1]: Started systemd-journald.service. Jul 10 00:57:30.728920 kernel: audit: type=1130 audit(1752109050.724:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:57:30.724000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:57:30.706024 systemd-resolved[219]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Jul 10 00:57:30.706051 systemd-resolved[219]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Jul 10 00:57:30.708018 systemd-resolved[219]: Defaulting to hostname 'linux'. Jul 10 00:57:30.722168 systemd-modules-load[218]: Inserted module 'br_netfilter' Jul 10 00:57:30.730870 dracut-cmdline[233]: dracut-dracut-053 Jul 10 00:57:30.730870 dracut-cmdline[233]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LA Jul 10 00:57:30.730870 dracut-cmdline[233]: BEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=vmware flatcar.autologin verity.usrhash=6cddad5f675165861f6062277cc28875548c735477e689762fc73abc16b63a3d Jul 10 00:57:30.742750 kernel: SCSI subsystem initialized Jul 10 00:57:30.756212 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Jul 10 00:57:30.756247 kernel: device-mapper: uevent: version 1.0.3 Jul 10 00:57:30.758747 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Jul 10 00:57:30.763789 systemd-modules-load[218]: Inserted module 'dm_multipath' Jul 10 00:57:30.771949 kernel: audit: type=1130 audit(1752109050.762:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:57:30.771969 kernel: Loading iSCSI transport class v2.0-870. Jul 10 00:57:30.762000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:57:30.764210 systemd[1]: Finished systemd-modules-load.service. Jul 10 00:57:30.764753 systemd[1]: Starting systemd-sysctl.service... Jul 10 00:57:30.772600 systemd[1]: Finished systemd-sysctl.service. Jul 10 00:57:30.775067 kernel: audit: type=1130 audit(1752109050.770:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:57:30.770000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:57:30.784755 kernel: iscsi: registered transport (tcp) Jul 10 00:57:30.801150 kernel: iscsi: registered transport (qla4xxx) Jul 10 00:57:30.801187 kernel: QLogic iSCSI HBA Driver Jul 10 00:57:30.816000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:57:30.817664 systemd[1]: Finished dracut-cmdline.service. Jul 10 00:57:30.820837 kernel: audit: type=1130 audit(1752109050.816:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:57:30.818278 systemd[1]: Starting dracut-pre-udev.service... Jul 10 00:57:30.855758 kernel: raid6: avx2x4 gen() 45161 MB/s Jul 10 00:57:30.872767 kernel: raid6: avx2x4 xor() 17118 MB/s Jul 10 00:57:30.889756 kernel: raid6: avx2x2 gen() 49488 MB/s Jul 10 00:57:30.906770 kernel: raid6: avx2x2 xor() 30733 MB/s Jul 10 00:57:30.923757 kernel: raid6: avx2x1 gen() 42477 MB/s Jul 10 00:57:30.940761 kernel: raid6: avx2x1 xor() 25242 MB/s Jul 10 00:57:30.957756 kernel: raid6: sse2x4 gen() 20895 MB/s Jul 10 00:57:30.974754 kernel: raid6: sse2x4 xor() 11900 MB/s Jul 10 00:57:30.991748 kernel: raid6: sse2x2 gen() 21429 MB/s Jul 10 00:57:31.008750 kernel: raid6: sse2x2 xor() 13188 MB/s Jul 10 00:57:31.025750 kernel: raid6: sse2x1 gen() 18007 MB/s Jul 10 00:57:31.042925 kernel: raid6: sse2x1 xor() 8869 MB/s Jul 10 00:57:31.042956 kernel: raid6: using algorithm avx2x2 gen() 49488 MB/s Jul 10 00:57:31.042965 kernel: raid6: .... xor() 30733 MB/s, rmw enabled Jul 10 00:57:31.044102 kernel: raid6: using avx2x2 recovery algorithm Jul 10 00:57:31.052750 kernel: xor: automatically using best checksumming function avx Jul 10 00:57:31.117755 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no Jul 10 00:57:31.123105 systemd[1]: Finished dracut-pre-udev.service. Jul 10 00:57:31.121000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:57:31.123820 systemd[1]: Starting systemd-udevd.service... Jul 10 00:57:31.121000 audit: BPF prog-id=7 op=LOAD Jul 10 00:57:31.121000 audit: BPF prog-id=8 op=LOAD Jul 10 00:57:31.128754 kernel: audit: type=1130 audit(1752109051.121:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:57:31.135237 systemd-udevd[415]: Using default interface naming scheme 'v252'. Jul 10 00:57:31.138136 systemd[1]: Started systemd-udevd.service. Jul 10 00:57:31.138714 systemd[1]: Starting dracut-pre-trigger.service... Jul 10 00:57:31.136000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:57:31.146333 dracut-pre-trigger[420]: rd.md=0: removing MD RAID activation Jul 10 00:57:31.162000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:57:31.163779 systemd[1]: Finished dracut-pre-trigger.service. Jul 10 00:57:31.164331 systemd[1]: Starting systemd-udev-trigger.service... Jul 10 00:57:31.227318 systemd[1]: Finished systemd-udev-trigger.service. Jul 10 00:57:31.226000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:57:31.284991 kernel: VMware PVSCSI driver - version 1.0.7.0-k Jul 10 00:57:31.285025 kernel: vmw_pvscsi: using 64bit dma Jul 10 00:57:31.288743 kernel: vmw_pvscsi: max_id: 16 Jul 10 00:57:31.288765 kernel: vmw_pvscsi: setting ring_pages to 8 Jul 10 00:57:31.292749 kernel: VMware vmxnet3 virtual NIC driver - version 1.6.0.0-k-NAPI Jul 10 00:57:31.299748 kernel: vmxnet3 0000:0b:00.0: # of Tx queues : 2, # of Rx queues : 2 Jul 10 00:57:31.318294 kernel: cryptd: max_cpu_qlen set to 1000 Jul 10 00:57:31.318305 kernel: vmw_pvscsi: enabling reqCallThreshold Jul 10 00:57:31.318313 kernel: vmw_pvscsi: driver-based request coalescing enabled Jul 10 00:57:31.318320 kernel: vmw_pvscsi: using MSI-X Jul 10 00:57:31.318327 kernel: scsi host0: VMware PVSCSI storage adapter rev 2, req/cmp/msg rings: 8/8/1 pages, cmd_per_lun=254 Jul 10 00:57:31.318403 kernel: vmw_pvscsi 0000:03:00.0: VMware PVSCSI rev 2 host #0 Jul 10 00:57:31.318470 kernel: scsi 0:0:0:0: Direct-Access VMware Virtual disk 2.0 PQ: 0 ANSI: 6 Jul 10 00:57:31.318538 kernel: vmxnet3 0000:0b:00.0 eth0: NIC Link is Up 10000 Mbps Jul 10 00:57:31.320769 kernel: vmxnet3 0000:0b:00.0 ens192: renamed from eth0 Jul 10 00:57:31.323745 kernel: AVX2 version of gcm_enc/dec engaged. Jul 10 00:57:31.325745 kernel: AES CTR mode by8 optimization enabled Jul 10 00:57:31.332748 kernel: libata version 3.00 loaded. Jul 10 00:57:31.335090 kernel: ata_piix 0000:00:07.1: version 2.13 Jul 10 00:57:31.338495 kernel: scsi host1: ata_piix Jul 10 00:57:31.338564 kernel: scsi host2: ata_piix Jul 10 00:57:31.338626 kernel: ata1: PATA max UDMA/33 cmd 0x1f0 ctl 0x3f6 bmdma 0x1060 irq 14 Jul 10 00:57:31.338638 kernel: ata2: PATA max UDMA/33 cmd 0x170 ctl 0x376 bmdma 0x1068 irq 15 Jul 10 00:57:31.338645 kernel: sd 0:0:0:0: [sda] 17805312 512-byte logical blocks: (9.12 GB/8.49 GiB) Jul 10 00:57:31.381459 kernel: sd 0:0:0:0: [sda] Write Protect is off Jul 10 00:57:31.381555 kernel: sd 0:0:0:0: [sda] Mode Sense: 31 00 00 00 Jul 10 00:57:31.381640 kernel: sd 0:0:0:0: [sda] Cache data unavailable Jul 10 00:57:31.381721 kernel: sd 0:0:0:0: [sda] Assuming drive cache: write through Jul 10 00:57:31.381813 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Jul 10 00:57:31.381825 kernel: sd 0:0:0:0: [sda] Attached SCSI disk Jul 10 00:57:31.503764 kernel: ata2.00: ATAPI: VMware Virtual IDE CDROM Drive, 00000001, max UDMA/33 Jul 10 00:57:31.512213 kernel: scsi 2:0:0:0: CD-ROM NECVMWar VMware IDE CDR10 1.00 PQ: 0 ANSI: 5 Jul 10 00:57:31.540286 kernel: sr 2:0:0:0: [sr0] scsi3-mmc drive: 1x/1x writer dvd-ram cd/rw xa/form2 cdda tray Jul 10 00:57:31.557962 kernel: cdrom: Uniform CD-ROM driver Revision: 3.20 Jul 10 00:57:31.557978 kernel: sr 2:0:0:0: Attached scsi CD-ROM sr0 Jul 10 00:57:31.579383 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Jul 10 00:57:31.579750 kernel: BTRFS: device label OEM devid 1 transid 9 /dev/sda6 scanned by (udev-worker) (466) Jul 10 00:57:31.582669 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Jul 10 00:57:31.583054 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Jul 10 00:57:31.585605 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Jul 10 00:57:31.588149 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Jul 10 00:57:31.590461 systemd[1]: Starting disk-uuid.service... Jul 10 00:57:31.612753 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Jul 10 00:57:31.617749 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Jul 10 00:57:31.622752 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Jul 10 00:57:32.689125 disk-uuid[548]: The operation has completed successfully. Jul 10 00:57:32.689750 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Jul 10 00:57:32.821262 systemd[1]: disk-uuid.service: Deactivated successfully. Jul 10 00:57:32.819000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:57:32.819000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:57:32.821334 systemd[1]: Finished disk-uuid.service. Jul 10 00:57:32.822061 systemd[1]: Starting verity-setup.service... Jul 10 00:57:32.835759 kernel: device-mapper: verity: sha256 using implementation "sha256-avx2" Jul 10 00:57:32.928880 systemd[1]: Found device dev-mapper-usr.device. Jul 10 00:57:32.929435 systemd[1]: Mounting sysusr-usr.mount... Jul 10 00:57:32.932063 systemd[1]: Finished verity-setup.service. Jul 10 00:57:32.930000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:57:32.999745 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Jul 10 00:57:32.999727 systemd[1]: Mounted sysusr-usr.mount. Jul 10 00:57:33.000366 systemd[1]: Starting afterburn-network-kargs.service... Jul 10 00:57:33.000827 systemd[1]: Starting ignition-setup.service... Jul 10 00:57:33.112540 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Jul 10 00:57:33.112584 kernel: BTRFS info (device sda6): using free space tree Jul 10 00:57:33.112593 kernel: BTRFS info (device sda6): has skinny extents Jul 10 00:57:33.179758 kernel: BTRFS info (device sda6): enabling ssd optimizations Jul 10 00:57:33.203996 systemd[1]: mnt-oem.mount: Deactivated successfully. Jul 10 00:57:33.217000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:57:33.219546 systemd[1]: Finished ignition-setup.service. Jul 10 00:57:33.220167 systemd[1]: Starting ignition-fetch-offline.service... Jul 10 00:57:33.333604 systemd[1]: Finished afterburn-network-kargs.service. Jul 10 00:57:33.332000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=afterburn-network-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:57:33.334335 systemd[1]: Starting parse-ip-for-networkd.service... Jul 10 00:57:33.373000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:57:33.373000 audit: BPF prog-id=9 op=LOAD Jul 10 00:57:33.374972 systemd[1]: Finished parse-ip-for-networkd.service. Jul 10 00:57:33.375936 systemd[1]: Starting systemd-networkd.service... Jul 10 00:57:33.393056 systemd-networkd[734]: lo: Link UP Jul 10 00:57:33.393359 systemd-networkd[734]: lo: Gained carrier Jul 10 00:57:33.393920 systemd-networkd[734]: Enumeration completed Jul 10 00:57:33.394183 systemd[1]: Started systemd-networkd.service. Jul 10 00:57:33.394415 systemd[1]: Reached target network.target. Jul 10 00:57:33.392000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:57:33.394659 systemd-networkd[734]: ens192: Configuring with /etc/systemd/network/10-dracut-cmdline-99.network. Jul 10 00:57:33.395606 systemd[1]: Starting iscsiuio.service... Jul 10 00:57:33.398321 kernel: vmxnet3 0000:0b:00.0 ens192: intr type 3, mode 0, 3 vectors allocated Jul 10 00:57:33.398466 kernel: vmxnet3 0000:0b:00.0 ens192: NIC Link is Up 10000 Mbps Jul 10 00:57:33.399223 systemd-networkd[734]: ens192: Link UP Jul 10 00:57:33.399364 systemd-networkd[734]: ens192: Gained carrier Jul 10 00:57:33.401879 systemd[1]: Started iscsiuio.service. Jul 10 00:57:33.400000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:57:33.403210 systemd[1]: Starting iscsid.service... Jul 10 00:57:33.405235 iscsid[739]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Jul 10 00:57:33.405235 iscsid[739]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Jul 10 00:57:33.405235 iscsid[739]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Jul 10 00:57:33.405235 iscsid[739]: If using hardware iscsi like qla4xxx this message can be ignored. Jul 10 00:57:33.405235 iscsid[739]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Jul 10 00:57:33.405235 iscsid[739]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Jul 10 00:57:33.405000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:57:33.406883 systemd[1]: Started iscsid.service. Jul 10 00:57:33.407587 systemd[1]: Starting dracut-initqueue.service... Jul 10 00:57:33.415000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:57:33.416791 systemd[1]: Finished dracut-initqueue.service. Jul 10 00:57:33.416967 systemd[1]: Reached target remote-fs-pre.target. Jul 10 00:57:33.417059 systemd[1]: Reached target remote-cryptsetup.target. Jul 10 00:57:33.417156 systemd[1]: Reached target remote-fs.target. Jul 10 00:57:33.417793 systemd[1]: Starting dracut-pre-mount.service... Jul 10 00:57:33.422000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:57:33.423950 systemd[1]: Finished dracut-pre-mount.service. Jul 10 00:57:33.620345 ignition[606]: Ignition 2.14.0 Jul 10 00:57:33.620353 ignition[606]: Stage: fetch-offline Jul 10 00:57:33.620401 ignition[606]: reading system config file "/usr/lib/ignition/base.d/base.ign" Jul 10 00:57:33.620426 ignition[606]: parsing config with SHA512: bd85a898f7da4744ff98e02742aa4854e1ceea8026a4e95cb6fb599b39b54cff0db353847df13d3c55ae196a9dc5d648977228d55e5da3ea20cd600fa7cec8ed Jul 10 00:57:33.633985 ignition[606]: no config dir at "/usr/lib/ignition/base.platform.d/vmware" Jul 10 00:57:33.634344 ignition[606]: parsed url from cmdline: "" Jul 10 00:57:33.634388 ignition[606]: no config URL provided Jul 10 00:57:33.634510 ignition[606]: reading system config file "/usr/lib/ignition/user.ign" Jul 10 00:57:33.634660 ignition[606]: no config at "/usr/lib/ignition/user.ign" Jul 10 00:57:33.635194 ignition[606]: config successfully fetched Jul 10 00:57:33.635246 ignition[606]: parsing config with SHA512: bcc168319dcec46a6c9c4344910d2b0a763453149edb58298962da451261f2d73a0d7d3dadb413b3881cf64e7627baedc590210036d4277f91b23c4f3ad0857a Jul 10 00:57:33.679725 unknown[606]: fetched base config from "system" Jul 10 00:57:33.679732 unknown[606]: fetched user config from "vmware" Jul 10 00:57:33.680043 ignition[606]: fetch-offline: fetch-offline passed Jul 10 00:57:33.680102 ignition[606]: Ignition finished successfully Jul 10 00:57:33.679000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:57:33.680679 systemd[1]: Finished ignition-fetch-offline.service. Jul 10 00:57:33.680843 systemd[1]: ignition-fetch.service was skipped because of an unmet condition check (ConditionPathExists=!/run/ignition.json). Jul 10 00:57:33.681395 systemd[1]: Starting ignition-kargs.service... Jul 10 00:57:33.687600 ignition[754]: Ignition 2.14.0 Jul 10 00:57:33.687606 ignition[754]: Stage: kargs Jul 10 00:57:33.687675 ignition[754]: reading system config file "/usr/lib/ignition/base.d/base.ign" Jul 10 00:57:33.687686 ignition[754]: parsing config with SHA512: bd85a898f7da4744ff98e02742aa4854e1ceea8026a4e95cb6fb599b39b54cff0db353847df13d3c55ae196a9dc5d648977228d55e5da3ea20cd600fa7cec8ed Jul 10 00:57:33.689025 ignition[754]: no config dir at "/usr/lib/ignition/base.platform.d/vmware" Jul 10 00:57:33.690244 ignition[754]: kargs: kargs passed Jul 10 00:57:33.690291 ignition[754]: Ignition finished successfully Jul 10 00:57:33.689000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:57:33.691360 systemd[1]: Finished ignition-kargs.service. Jul 10 00:57:33.691982 systemd[1]: Starting ignition-disks.service... Jul 10 00:57:33.697038 ignition[760]: Ignition 2.14.0 Jul 10 00:57:33.697338 ignition[760]: Stage: disks Jul 10 00:57:33.697526 ignition[760]: reading system config file "/usr/lib/ignition/base.d/base.ign" Jul 10 00:57:33.697693 ignition[760]: parsing config with SHA512: bd85a898f7da4744ff98e02742aa4854e1ceea8026a4e95cb6fb599b39b54cff0db353847df13d3c55ae196a9dc5d648977228d55e5da3ea20cd600fa7cec8ed Jul 10 00:57:33.699042 ignition[760]: no config dir at "/usr/lib/ignition/base.platform.d/vmware" Jul 10 00:57:33.700478 ignition[760]: disks: disks passed Jul 10 00:57:33.700666 ignition[760]: Ignition finished successfully Jul 10 00:57:33.701349 systemd[1]: Finished ignition-disks.service. Jul 10 00:57:33.701513 systemd[1]: Reached target initrd-root-device.target. Jul 10 00:57:33.701610 systemd[1]: Reached target local-fs-pre.target. Jul 10 00:57:33.701697 systemd[1]: Reached target local-fs.target. Jul 10 00:57:33.701793 systemd[1]: Reached target sysinit.target. Jul 10 00:57:33.699000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:57:33.701874 systemd[1]: Reached target basic.target. Jul 10 00:57:33.703191 systemd[1]: Starting systemd-fsck-root.service... Jul 10 00:57:33.770416 systemd-fsck[768]: ROOT: clean, 619/1628000 files, 124060/1617920 blocks Jul 10 00:57:33.770000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:57:33.772014 systemd[1]: Finished systemd-fsck-root.service. Jul 10 00:57:33.772660 systemd[1]: Mounting sysroot.mount... Jul 10 00:57:33.782790 kernel: EXT4-fs (sda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Jul 10 00:57:33.782463 systemd[1]: Mounted sysroot.mount. Jul 10 00:57:33.782676 systemd[1]: Reached target initrd-root-fs.target. Jul 10 00:57:33.784124 systemd[1]: Mounting sysroot-usr.mount... Jul 10 00:57:33.784642 systemd[1]: flatcar-metadata-hostname.service was skipped because no trigger condition checks were met. Jul 10 00:57:33.784678 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Jul 10 00:57:33.784699 systemd[1]: Reached target ignition-diskful.target. Jul 10 00:57:33.787582 systemd[1]: Mounted sysroot-usr.mount. Jul 10 00:57:33.788569 systemd[1]: Starting initrd-setup-root.service... Jul 10 00:57:33.793949 initrd-setup-root[778]: cut: /sysroot/etc/passwd: No such file or directory Jul 10 00:57:33.825842 initrd-setup-root[786]: cut: /sysroot/etc/group: No such file or directory Jul 10 00:57:33.830934 initrd-setup-root[794]: cut: /sysroot/etc/shadow: No such file or directory Jul 10 00:57:33.837318 initrd-setup-root[802]: cut: /sysroot/etc/gshadow: No such file or directory Jul 10 00:57:33.951334 systemd[1]: Mounting sysroot-usr-share-oem.mount... Jul 10 00:57:34.038752 kernel: BTRFS: device label OEM devid 1 transid 11 /dev/sda6 scanned by mount (810) Jul 10 00:57:34.041951 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Jul 10 00:57:34.041998 kernel: BTRFS info (device sda6): using free space tree Jul 10 00:57:34.042006 kernel: BTRFS info (device sda6): has skinny extents Jul 10 00:57:34.047755 kernel: BTRFS info (device sda6): enabling ssd optimizations Jul 10 00:57:34.049471 systemd[1]: Mounted sysroot-usr-share-oem.mount. Jul 10 00:57:34.052766 systemd[1]: Finished initrd-setup-root.service. Jul 10 00:57:34.053386 systemd[1]: Starting ignition-mount.service... Jul 10 00:57:34.051000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:57:34.053990 systemd[1]: Starting sysroot-boot.service... Jul 10 00:57:34.059546 systemd[1]: sysusr-usr-share-oem.mount: Deactivated successfully. Jul 10 00:57:34.059650 systemd[1]: sysroot-usr-share-oem.mount: Deactivated successfully. Jul 10 00:57:34.067182 ignition[839]: INFO : Ignition 2.14.0 Jul 10 00:57:34.067511 ignition[839]: INFO : Stage: mount Jul 10 00:57:34.067705 ignition[839]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Jul 10 00:57:34.067937 ignition[839]: DEBUG : parsing config with SHA512: bd85a898f7da4744ff98e02742aa4854e1ceea8026a4e95cb6fb599b39b54cff0db353847df13d3c55ae196a9dc5d648977228d55e5da3ea20cd600fa7cec8ed Jul 10 00:57:34.069619 ignition[839]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/vmware" Jul 10 00:57:34.071293 ignition[839]: INFO : mount: mount passed Jul 10 00:57:34.071477 ignition[839]: INFO : Ignition finished successfully Jul 10 00:57:34.070000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:57:34.072329 systemd[1]: Finished ignition-mount.service. Jul 10 00:57:34.073307 systemd[1]: Starting ignition-files.service... Jul 10 00:57:34.078903 systemd[1]: Mounting sysroot-usr-share-oem.mount... Jul 10 00:57:34.079000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:57:34.080845 systemd[1]: Finished sysroot-boot.service. Jul 10 00:57:34.088835 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/sda6 scanned by mount (849) Jul 10 00:57:34.088874 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Jul 10 00:57:34.091191 kernel: BTRFS info (device sda6): using free space tree Jul 10 00:57:34.091221 kernel: BTRFS info (device sda6): has skinny extents Jul 10 00:57:34.094751 kernel: BTRFS info (device sda6): enabling ssd optimizations Jul 10 00:57:34.096508 systemd[1]: Mounted sysroot-usr-share-oem.mount. Jul 10 00:57:34.102170 ignition[868]: INFO : Ignition 2.14.0 Jul 10 00:57:34.102170 ignition[868]: INFO : Stage: files Jul 10 00:57:34.102532 ignition[868]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Jul 10 00:57:34.102532 ignition[868]: DEBUG : parsing config with SHA512: bd85a898f7da4744ff98e02742aa4854e1ceea8026a4e95cb6fb599b39b54cff0db353847df13d3c55ae196a9dc5d648977228d55e5da3ea20cd600fa7cec8ed Jul 10 00:57:34.103554 ignition[868]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/vmware" Jul 10 00:57:34.107194 ignition[868]: DEBUG : files: compiled without relabeling support, skipping Jul 10 00:57:34.109602 ignition[868]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Jul 10 00:57:34.109602 ignition[868]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Jul 10 00:57:34.128402 ignition[868]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Jul 10 00:57:34.128671 ignition[868]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Jul 10 00:57:34.140779 unknown[868]: wrote ssh authorized keys file for user: core Jul 10 00:57:34.141355 ignition[868]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Jul 10 00:57:34.150052 ignition[868]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/home/core/install.sh" Jul 10 00:57:34.150291 ignition[868]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/home/core/install.sh" Jul 10 00:57:34.157352 ignition[868]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/etc/flatcar/update.conf" Jul 10 00:57:34.157595 ignition[868]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/etc/flatcar/update.conf" Jul 10 00:57:34.157595 ignition[868]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.32.4-x86-64.raw" Jul 10 00:57:34.157595 ignition[868]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.32.4-x86-64.raw" Jul 10 00:57:34.159596 ignition[868]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/etc/systemd/system/vmtoolsd.service" Jul 10 00:57:34.159801 ignition[868]: INFO : files: createFilesystemsFiles: createFiles: op(6): oem config not found in "/usr/share/oem", looking on oem partition Jul 10 00:57:34.177645 ignition[868]: INFO : files: createFilesystemsFiles: createFiles: op(6): op(7): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2267871548" Jul 10 00:57:34.177910 ignition[868]: CRITICAL : files: createFilesystemsFiles: createFiles: op(6): op(7): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2267871548": device or resource busy Jul 10 00:57:34.177910 ignition[868]: ERROR : files: createFilesystemsFiles: createFiles: op(6): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem2267871548", trying btrfs: device or resource busy Jul 10 00:57:34.177910 ignition[868]: INFO : files: createFilesystemsFiles: createFiles: op(6): op(8): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2267871548" Jul 10 00:57:34.177910 ignition[868]: INFO : files: createFilesystemsFiles: createFiles: op(6): op(8): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2267871548" Jul 10 00:57:34.183669 ignition[868]: INFO : files: createFilesystemsFiles: createFiles: op(6): op(9): [started] unmounting "/mnt/oem2267871548" Jul 10 00:57:34.183905 ignition[868]: INFO : files: createFilesystemsFiles: createFiles: op(6): op(9): [finished] unmounting "/mnt/oem2267871548" Jul 10 00:57:34.183905 ignition[868]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/etc/systemd/system/vmtoolsd.service" Jul 10 00:57:34.183905 ignition[868]: INFO : files: createFilesystemsFiles: createFiles: op(a): [started] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.32.4-x86-64.raw" Jul 10 00:57:34.184412 ignition[868]: INFO : files: createFilesystemsFiles: createFiles: op(a): GET https://extensions.flatcar.org/extensions/kubernetes-v1.32.4-x86-64.raw: attempt #1 Jul 10 00:57:34.986614 ignition[868]: INFO : files: createFilesystemsFiles: createFiles: op(a): GET result: OK Jul 10 00:57:35.419096 systemd-networkd[734]: ens192: Gained IPv6LL Jul 10 00:57:35.977893 ignition[868]: INFO : files: createFilesystemsFiles: createFiles: op(a): [finished] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.32.4-x86-64.raw" Jul 10 00:57:35.979163 ignition[868]: INFO : files: createFilesystemsFiles: createFiles: op(b): [started] writing file "/sysroot/etc/systemd/network/00-vmware.network" Jul 10 00:57:35.979507 ignition[868]: INFO : files: createFilesystemsFiles: createFiles: op(b): [finished] writing file "/sysroot/etc/systemd/network/00-vmware.network" Jul 10 00:57:35.979760 ignition[868]: INFO : files: op(c): [started] processing unit "vmtoolsd.service" Jul 10 00:57:35.979926 ignition[868]: INFO : files: op(c): [finished] processing unit "vmtoolsd.service" Jul 10 00:57:35.980117 ignition[868]: INFO : files: op(d): [started] processing unit "coreos-metadata.service" Jul 10 00:57:35.980304 ignition[868]: INFO : files: op(d): op(e): [started] writing unit "coreos-metadata.service" at "/sysroot/etc/systemd/system/coreos-metadata.service" Jul 10 00:57:35.980629 ignition[868]: INFO : files: op(d): op(e): [finished] writing unit "coreos-metadata.service" at "/sysroot/etc/systemd/system/coreos-metadata.service" Jul 10 00:57:35.980862 ignition[868]: INFO : files: op(d): [finished] processing unit "coreos-metadata.service" Jul 10 00:57:35.981052 ignition[868]: INFO : files: op(f): [started] setting preset to enabled for "vmtoolsd.service" Jul 10 00:57:35.981293 ignition[868]: INFO : files: op(f): [finished] setting preset to enabled for "vmtoolsd.service" Jul 10 00:57:35.981482 ignition[868]: INFO : files: op(10): [started] setting preset to disabled for "coreos-metadata.service" Jul 10 00:57:35.981968 ignition[868]: INFO : files: op(10): op(11): [started] removing enablement symlink(s) for "coreos-metadata.service" Jul 10 00:57:36.178353 ignition[868]: INFO : files: op(10): op(11): [finished] removing enablement symlink(s) for "coreos-metadata.service" Jul 10 00:57:36.178679 ignition[868]: INFO : files: op(10): [finished] setting preset to disabled for "coreos-metadata.service" Jul 10 00:57:36.178679 ignition[868]: INFO : files: createResultFile: createFiles: op(12): [started] writing file "/sysroot/etc/.ignition-result.json" Jul 10 00:57:36.178679 ignition[868]: INFO : files: createResultFile: createFiles: op(12): [finished] writing file "/sysroot/etc/.ignition-result.json" Jul 10 00:57:36.178679 ignition[868]: INFO : files: files passed Jul 10 00:57:36.179486 ignition[868]: INFO : Ignition finished successfully Jul 10 00:57:36.180488 systemd[1]: Finished ignition-files.service. Jul 10 00:57:36.178000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:57:36.182608 systemd[1]: Starting initrd-setup-root-after-ignition.service... Jul 10 00:57:36.185385 kernel: kauditd_printk_skb: 24 callbacks suppressed Jul 10 00:57:36.185403 kernel: audit: type=1130 audit(1752109056.178:35): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:57:36.185266 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Jul 10 00:57:36.185816 systemd[1]: Starting ignition-quench.service... Jul 10 00:57:36.189097 systemd[1]: ignition-quench.service: Deactivated successfully. Jul 10 00:57:36.189177 systemd[1]: Finished ignition-quench.service. Jul 10 00:57:36.187000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:57:36.190336 initrd-setup-root-after-ignition[894]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Jul 10 00:57:36.196640 kernel: audit: type=1130 audit(1752109056.187:36): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:57:36.196661 kernel: audit: type=1131 audit(1752109056.187:37): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:57:36.187000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:57:36.193067 systemd[1]: Finished initrd-setup-root-after-ignition.service. Jul 10 00:57:36.200373 kernel: audit: type=1130 audit(1752109056.194:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:57:36.194000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:57:36.196847 systemd[1]: Reached target ignition-complete.target. Jul 10 00:57:36.201383 systemd[1]: Starting initrd-parse-etc.service... Jul 10 00:57:36.211114 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Jul 10 00:57:36.211388 systemd[1]: Finished initrd-parse-etc.service. Jul 10 00:57:36.209000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:57:36.211759 systemd[1]: Reached target initrd-fs.target. Jul 10 00:57:36.216578 kernel: audit: type=1130 audit(1752109056.209:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:57:36.216594 kernel: audit: type=1131 audit(1752109056.209:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:57:36.209000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:57:36.216636 systemd[1]: Reached target initrd.target. Jul 10 00:57:36.216800 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Jul 10 00:57:36.217322 systemd[1]: Starting dracut-pre-pivot.service... Jul 10 00:57:36.224034 systemd[1]: Finished dracut-pre-pivot.service. Jul 10 00:57:36.222000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:57:36.224731 systemd[1]: Starting initrd-cleanup.service... Jul 10 00:57:36.227440 kernel: audit: type=1130 audit(1752109056.222:41): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:57:36.231757 systemd[1]: initrd-cleanup.service: Deactivated successfully. Jul 10 00:57:36.231947 systemd[1]: Finished initrd-cleanup.service. Jul 10 00:57:36.230000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:57:36.232577 systemd[1]: Stopped target nss-lookup.target. Jul 10 00:57:36.236921 kernel: audit: type=1130 audit(1752109056.230:42): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:57:36.236934 kernel: audit: type=1131 audit(1752109056.230:43): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:57:36.230000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:57:36.237054 systemd[1]: Stopped target remote-cryptsetup.target. Jul 10 00:57:36.237283 systemd[1]: Stopped target timers.target. Jul 10 00:57:36.237503 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Jul 10 00:57:36.237654 systemd[1]: Stopped dracut-pre-pivot.service. Jul 10 00:57:36.236000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:57:36.237989 systemd[1]: Stopped target initrd.target. Jul 10 00:57:36.240651 systemd[1]: Stopped target basic.target. Jul 10 00:57:36.240792 kernel: audit: type=1131 audit(1752109056.236:44): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:57:36.240920 systemd[1]: Stopped target ignition-complete.target. Jul 10 00:57:36.241150 systemd[1]: Stopped target ignition-diskful.target. Jul 10 00:57:36.241359 systemd[1]: Stopped target initrd-root-device.target. Jul 10 00:57:36.241572 systemd[1]: Stopped target remote-fs.target. Jul 10 00:57:36.241777 systemd[1]: Stopped target remote-fs-pre.target. Jul 10 00:57:36.241995 systemd[1]: Stopped target sysinit.target. Jul 10 00:57:36.242193 systemd[1]: Stopped target local-fs.target. Jul 10 00:57:36.242389 systemd[1]: Stopped target local-fs-pre.target. Jul 10 00:57:36.242600 systemd[1]: Stopped target swap.target. Jul 10 00:57:36.242828 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Jul 10 00:57:36.242984 systemd[1]: Stopped dracut-pre-mount.service. Jul 10 00:57:36.241000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:57:36.243259 systemd[1]: Stopped target cryptsetup.target. Jul 10 00:57:36.243463 systemd[1]: dracut-initqueue.service: Deactivated successfully. Jul 10 00:57:36.243611 systemd[1]: Stopped dracut-initqueue.service. Jul 10 00:57:36.242000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:57:36.243892 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Jul 10 00:57:36.244048 systemd[1]: Stopped ignition-fetch-offline.service. Jul 10 00:57:36.242000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:57:36.244313 systemd[1]: Stopped target paths.target. Jul 10 00:57:36.244508 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Jul 10 00:57:36.245771 systemd[1]: Stopped systemd-ask-password-console.path. Jul 10 00:57:36.245984 systemd[1]: Stopped target slices.target. Jul 10 00:57:36.246179 systemd[1]: Stopped target sockets.target. Jul 10 00:57:36.246388 systemd[1]: iscsid.socket: Deactivated successfully. Jul 10 00:57:36.246526 systemd[1]: Closed iscsid.socket. Jul 10 00:57:36.246727 systemd[1]: iscsiuio.socket: Deactivated successfully. Jul 10 00:57:36.246879 systemd[1]: Closed iscsiuio.socket. Jul 10 00:57:36.247091 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Jul 10 00:57:36.247252 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Jul 10 00:57:36.245000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:57:36.247536 systemd[1]: ignition-files.service: Deactivated successfully. Jul 10 00:57:36.247685 systemd[1]: Stopped ignition-files.service. Jul 10 00:57:36.246000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:57:36.248350 systemd[1]: Stopping ignition-mount.service... Jul 10 00:57:36.248987 systemd[1]: Stopping sysroot-boot.service... Jul 10 00:57:36.249216 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Jul 10 00:57:36.249379 systemd[1]: Stopped systemd-udev-trigger.service. Jul 10 00:57:36.249627 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Jul 10 00:57:36.249783 systemd[1]: Stopped dracut-pre-trigger.service. Jul 10 00:57:36.247000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:57:36.248000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:57:36.254349 ignition[907]: INFO : Ignition 2.14.0 Jul 10 00:57:36.254349 ignition[907]: INFO : Stage: umount Jul 10 00:57:36.254663 ignition[907]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Jul 10 00:57:36.254663 ignition[907]: DEBUG : parsing config with SHA512: bd85a898f7da4744ff98e02742aa4854e1ceea8026a4e95cb6fb599b39b54cff0db353847df13d3c55ae196a9dc5d648977228d55e5da3ea20cd600fa7cec8ed Jul 10 00:57:36.255928 ignition[907]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/vmware" Jul 10 00:57:36.256650 ignition[907]: INFO : umount: umount passed Jul 10 00:57:36.256650 ignition[907]: INFO : Ignition finished successfully Jul 10 00:57:36.257024 systemd[1]: ignition-mount.service: Deactivated successfully. Jul 10 00:57:36.257090 systemd[1]: Stopped ignition-mount.service. Jul 10 00:57:36.257298 systemd[1]: Stopped target network.target. Jul 10 00:57:36.255000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:57:36.257396 systemd[1]: ignition-disks.service: Deactivated successfully. Jul 10 00:57:36.255000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:57:36.257422 systemd[1]: Stopped ignition-disks.service. Jul 10 00:57:36.256000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:57:36.257555 systemd[1]: ignition-kargs.service: Deactivated successfully. Jul 10 00:57:36.257576 systemd[1]: Stopped ignition-kargs.service. Jul 10 00:57:36.256000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:57:36.257889 systemd[1]: ignition-setup.service: Deactivated successfully. Jul 10 00:57:36.257910 systemd[1]: Stopped ignition-setup.service. Jul 10 00:57:36.258095 systemd[1]: Stopping systemd-networkd.service... Jul 10 00:57:36.258524 systemd[1]: Stopping systemd-resolved.service... Jul 10 00:57:36.262350 systemd[1]: systemd-networkd.service: Deactivated successfully. Jul 10 00:57:36.262405 systemd[1]: Stopped systemd-networkd.service. Jul 10 00:57:36.260000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:57:36.263649 systemd[1]: systemd-resolved.service: Deactivated successfully. Jul 10 00:57:36.263704 systemd[1]: Stopped systemd-resolved.service. Jul 10 00:57:36.262000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:57:36.264807 systemd[1]: systemd-networkd.socket: Deactivated successfully. Jul 10 00:57:36.264832 systemd[1]: Closed systemd-networkd.socket. Jul 10 00:57:36.263000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:57:36.264000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=afterburn-network-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:57:36.264000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:57:36.264000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:57:36.265422 systemd[1]: Stopping network-cleanup.service... Jul 10 00:57:36.265000 audit: BPF prog-id=9 op=UNLOAD Jul 10 00:57:36.265000 audit: BPF prog-id=6 op=UNLOAD Jul 10 00:57:36.265519 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Jul 10 00:57:36.265549 systemd[1]: Stopped parse-ip-for-networkd.service. Jul 10 00:57:36.265687 systemd[1]: afterburn-network-kargs.service: Deactivated successfully. Jul 10 00:57:36.265711 systemd[1]: Stopped afterburn-network-kargs.service. Jul 10 00:57:36.265831 systemd[1]: systemd-sysctl.service: Deactivated successfully. Jul 10 00:57:36.265858 systemd[1]: Stopped systemd-sysctl.service. Jul 10 00:57:36.266020 systemd[1]: systemd-modules-load.service: Deactivated successfully. Jul 10 00:57:36.266041 systemd[1]: Stopped systemd-modules-load.service. Jul 10 00:57:36.268313 systemd[1]: Stopping systemd-udevd.service... Jul 10 00:57:36.269419 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Jul 10 00:57:36.271000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:57:36.272662 systemd[1]: network-cleanup.service: Deactivated successfully. Jul 10 00:57:36.272770 systemd[1]: Stopped network-cleanup.service. Jul 10 00:57:36.273607 systemd[1]: sysroot-boot.mount: Deactivated successfully. Jul 10 00:57:36.274046 systemd[1]: systemd-udevd.service: Deactivated successfully. Jul 10 00:57:36.274124 systemd[1]: Stopped systemd-udevd.service. Jul 10 00:57:36.272000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:57:36.274393 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Jul 10 00:57:36.274412 systemd[1]: Closed systemd-udevd-control.socket. Jul 10 00:57:36.274851 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Jul 10 00:57:36.274869 systemd[1]: Closed systemd-udevd-kernel.socket. Jul 10 00:57:36.273000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:57:36.274982 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Jul 10 00:57:36.273000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:57:36.275005 systemd[1]: Stopped dracut-pre-udev.service. Jul 10 00:57:36.273000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:57:36.275190 systemd[1]: dracut-cmdline.service: Deactivated successfully. Jul 10 00:57:36.275210 systemd[1]: Stopped dracut-cmdline.service. Jul 10 00:57:36.275346 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Jul 10 00:57:36.275000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:57:36.275365 systemd[1]: Stopped dracut-cmdline-ask.service. Jul 10 00:57:36.276073 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Jul 10 00:57:36.276898 systemd[1]: systemd-tmpfiles-setup-dev.service: Deactivated successfully. Jul 10 00:57:36.276937 systemd[1]: Stopped systemd-tmpfiles-setup-dev.service. Jul 10 00:57:36.277132 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Jul 10 00:57:36.277163 systemd[1]: Stopped kmod-static-nodes.service. Jul 10 00:57:36.275000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:57:36.275000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:57:36.278000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:57:36.278000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:57:36.277279 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Jul 10 00:57:36.277308 systemd[1]: Stopped systemd-vconsole-setup.service. Jul 10 00:57:36.278290 systemd[1]: run-credentials-systemd\x2dtmpfiles\x2dsetup\x2ddev.service.mount: Deactivated successfully. Jul 10 00:57:36.279694 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Jul 10 00:57:36.279752 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Jul 10 00:57:36.484247 systemd[1]: sysroot-boot.service: Deactivated successfully. Jul 10 00:57:36.484322 systemd[1]: Stopped sysroot-boot.service. Jul 10 00:57:36.482000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:57:36.484678 systemd[1]: Reached target initrd-switch-root.target. Jul 10 00:57:36.484833 systemd[1]: initrd-setup-root.service: Deactivated successfully. Jul 10 00:57:36.484865 systemd[1]: Stopped initrd-setup-root.service. Jul 10 00:57:36.483000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:57:36.485604 systemd[1]: Starting initrd-switch-root.service... Jul 10 00:57:36.494821 systemd[1]: Switching root. Jul 10 00:57:36.514428 systemd-journald[217]: Journal stopped Jul 10 00:57:39.504904 systemd-journald[217]: Received SIGTERM from PID 1 (systemd). Jul 10 00:57:39.504922 kernel: SELinux: Class mctp_socket not defined in policy. Jul 10 00:57:39.504931 kernel: SELinux: Class anon_inode not defined in policy. Jul 10 00:57:39.504937 kernel: SELinux: the above unknown classes and permissions will be allowed Jul 10 00:57:39.504942 kernel: SELinux: policy capability network_peer_controls=1 Jul 10 00:57:39.504949 kernel: SELinux: policy capability open_perms=1 Jul 10 00:57:39.504955 kernel: SELinux: policy capability extended_socket_class=1 Jul 10 00:57:39.504961 kernel: SELinux: policy capability always_check_network=0 Jul 10 00:57:39.504966 kernel: SELinux: policy capability cgroup_seclabel=1 Jul 10 00:57:39.504972 kernel: SELinux: policy capability nnp_nosuid_transition=1 Jul 10 00:57:39.504977 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Jul 10 00:57:39.504983 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Jul 10 00:57:39.504990 systemd[1]: Successfully loaded SELinux policy in 82.051ms. Jul 10 00:57:39.504997 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 9.622ms. Jul 10 00:57:39.505005 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Jul 10 00:57:39.505011 systemd[1]: Detected virtualization vmware. Jul 10 00:57:39.505019 systemd[1]: Detected architecture x86-64. Jul 10 00:57:39.505025 systemd[1]: Detected first boot. Jul 10 00:57:39.505031 systemd[1]: Initializing machine ID from random generator. Jul 10 00:57:39.505037 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). Jul 10 00:57:39.505044 systemd[1]: Populated /etc with preset unit settings. Jul 10 00:57:39.505050 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Jul 10 00:57:39.505059 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Jul 10 00:57:39.505066 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Jul 10 00:57:39.505074 systemd[1]: iscsiuio.service: Deactivated successfully. Jul 10 00:57:39.505081 systemd[1]: Stopped iscsiuio.service. Jul 10 00:57:39.505087 systemd[1]: iscsid.service: Deactivated successfully. Jul 10 00:57:39.505095 systemd[1]: Stopped iscsid.service. Jul 10 00:57:39.505102 systemd[1]: initrd-switch-root.service: Deactivated successfully. Jul 10 00:57:39.505108 systemd[1]: Stopped initrd-switch-root.service. Jul 10 00:57:39.505115 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Jul 10 00:57:39.505122 systemd[1]: Created slice system-addon\x2dconfig.slice. Jul 10 00:57:39.505129 systemd[1]: Created slice system-addon\x2drun.slice. Jul 10 00:57:39.505473 systemd[1]: Created slice system-getty.slice. Jul 10 00:57:39.505484 systemd[1]: Created slice system-modprobe.slice. Jul 10 00:57:39.505491 systemd[1]: Created slice system-serial\x2dgetty.slice. Jul 10 00:57:39.505498 systemd[1]: Created slice system-system\x2dcloudinit.slice. Jul 10 00:57:39.505504 systemd[1]: Created slice system-systemd\x2dfsck.slice. Jul 10 00:57:39.505511 systemd[1]: Created slice user.slice. Jul 10 00:57:39.505519 systemd[1]: Started systemd-ask-password-console.path. Jul 10 00:57:39.505526 systemd[1]: Started systemd-ask-password-wall.path. Jul 10 00:57:39.505534 systemd[1]: Set up automount boot.automount. Jul 10 00:57:39.505541 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Jul 10 00:57:39.505547 systemd[1]: Stopped target initrd-switch-root.target. Jul 10 00:57:39.505554 systemd[1]: Stopped target initrd-fs.target. Jul 10 00:57:39.505561 systemd[1]: Stopped target initrd-root-fs.target. Jul 10 00:57:39.505567 systemd[1]: Reached target integritysetup.target. Jul 10 00:57:39.505574 systemd[1]: Reached target remote-cryptsetup.target. Jul 10 00:57:39.505583 systemd[1]: Reached target remote-fs.target. Jul 10 00:57:39.505590 systemd[1]: Reached target slices.target. Jul 10 00:57:39.505596 systemd[1]: Reached target swap.target. Jul 10 00:57:39.505603 systemd[1]: Reached target torcx.target. Jul 10 00:57:39.505610 systemd[1]: Reached target veritysetup.target. Jul 10 00:57:39.505617 systemd[1]: Listening on systemd-coredump.socket. Jul 10 00:57:39.505625 systemd[1]: Listening on systemd-initctl.socket. Jul 10 00:57:39.505632 systemd[1]: Listening on systemd-networkd.socket. Jul 10 00:57:39.505639 systemd[1]: Listening on systemd-udevd-control.socket. Jul 10 00:57:39.505646 systemd[1]: Listening on systemd-udevd-kernel.socket. Jul 10 00:57:39.505652 systemd[1]: Listening on systemd-userdbd.socket. Jul 10 00:57:39.505659 systemd[1]: Mounting dev-hugepages.mount... Jul 10 00:57:39.505666 systemd[1]: Mounting dev-mqueue.mount... Jul 10 00:57:39.505674 systemd[1]: Mounting media.mount... Jul 10 00:57:39.505681 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Jul 10 00:57:39.505688 systemd[1]: Mounting sys-kernel-debug.mount... Jul 10 00:57:39.505695 systemd[1]: Mounting sys-kernel-tracing.mount... Jul 10 00:57:39.505702 systemd[1]: Mounting tmp.mount... Jul 10 00:57:39.505709 systemd[1]: Starting flatcar-tmpfiles.service... Jul 10 00:57:39.505715 systemd[1]: Starting ignition-delete-config.service... Jul 10 00:57:39.505722 systemd[1]: Starting kmod-static-nodes.service... Jul 10 00:57:39.505730 systemd[1]: Starting modprobe@configfs.service... Jul 10 00:57:39.505756 systemd[1]: Starting modprobe@dm_mod.service... Jul 10 00:57:39.505765 systemd[1]: Starting modprobe@drm.service... Jul 10 00:57:39.505774 systemd[1]: Starting modprobe@efi_pstore.service... Jul 10 00:57:39.508849 systemd[1]: Starting modprobe@fuse.service... Jul 10 00:57:39.508864 systemd[1]: Starting modprobe@loop.service... Jul 10 00:57:39.508872 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Jul 10 00:57:39.508880 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Jul 10 00:57:39.508887 systemd[1]: Stopped systemd-fsck-root.service. Jul 10 00:57:39.508894 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Jul 10 00:57:39.508905 systemd[1]: Stopped systemd-fsck-usr.service. Jul 10 00:57:39.508912 systemd[1]: Stopped systemd-journald.service. Jul 10 00:57:39.508919 systemd[1]: Starting systemd-journald.service... Jul 10 00:57:39.508926 systemd[1]: Starting systemd-modules-load.service... Jul 10 00:57:39.508932 systemd[1]: Starting systemd-network-generator.service... Jul 10 00:57:39.508939 systemd[1]: Starting systemd-remount-fs.service... Jul 10 00:57:39.508946 systemd[1]: Starting systemd-udev-trigger.service... Jul 10 00:57:39.508953 systemd[1]: verity-setup.service: Deactivated successfully. Jul 10 00:57:39.508960 systemd[1]: Stopped verity-setup.service. Jul 10 00:57:39.508969 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Jul 10 00:57:39.508977 systemd[1]: Mounted dev-hugepages.mount. Jul 10 00:57:39.508984 systemd[1]: Mounted dev-mqueue.mount. Jul 10 00:57:39.508991 systemd[1]: Mounted media.mount. Jul 10 00:57:39.508998 systemd[1]: Mounted sys-kernel-debug.mount. Jul 10 00:57:39.509005 systemd[1]: Mounted sys-kernel-tracing.mount. Jul 10 00:57:39.509016 systemd-journald[1032]: Journal started Jul 10 00:57:39.509055 systemd-journald[1032]: Runtime Journal (/run/log/journal/e37a69af5f144c5fbeace4719beeabe9) is 4.8M, max 38.8M, 34.0M free. Jul 10 00:57:36.784000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Jul 10 00:57:36.910000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Jul 10 00:57:36.910000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Jul 10 00:57:36.910000 audit: BPF prog-id=10 op=LOAD Jul 10 00:57:36.910000 audit: BPF prog-id=10 op=UNLOAD Jul 10 00:57:36.910000 audit: BPF prog-id=11 op=LOAD Jul 10 00:57:36.910000 audit: BPF prog-id=11 op=UNLOAD Jul 10 00:57:37.128000 audit[941]: AVC avc: denied { associate } for pid=941 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Jul 10 00:57:37.128000 audit[941]: SYSCALL arch=c000003e syscall=188 success=yes exit=0 a0=c0001078cc a1=c00002ae40 a2=c000029100 a3=32 items=0 ppid=924 pid=941 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:57:37.128000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Jul 10 00:57:37.130000 audit[941]: AVC avc: denied { associate } for pid=941 comm="torcx-generator" name="lib" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Jul 10 00:57:37.130000 audit[941]: SYSCALL arch=c000003e syscall=258 success=yes exit=0 a0=ffffffffffffff9c a1=c0001079a5 a2=1ed a3=0 items=2 ppid=924 pid=941 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:57:37.130000 audit: CWD cwd="/" Jul 10 00:57:37.130000 audit: PATH item=0 name=(null) inode=2 dev=00:1b mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:57:37.130000 audit: PATH item=1 name=(null) inode=3 dev=00:1b mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:57:37.130000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Jul 10 00:57:39.406000 audit: BPF prog-id=12 op=LOAD Jul 10 00:57:39.406000 audit: BPF prog-id=3 op=UNLOAD Jul 10 00:57:39.407000 audit: BPF prog-id=13 op=LOAD Jul 10 00:57:39.407000 audit: BPF prog-id=14 op=LOAD Jul 10 00:57:39.407000 audit: BPF prog-id=4 op=UNLOAD Jul 10 00:57:39.407000 audit: BPF prog-id=5 op=UNLOAD Jul 10 00:57:39.514352 systemd[1]: Started systemd-journald.service. Jul 10 00:57:39.408000 audit: BPF prog-id=15 op=LOAD Jul 10 00:57:39.408000 audit: BPF prog-id=12 op=UNLOAD Jul 10 00:57:39.408000 audit: BPF prog-id=16 op=LOAD Jul 10 00:57:39.408000 audit: BPF prog-id=17 op=LOAD Jul 10 00:57:39.408000 audit: BPF prog-id=13 op=UNLOAD Jul 10 00:57:39.408000 audit: BPF prog-id=14 op=UNLOAD Jul 10 00:57:39.409000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:57:39.412000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:57:39.413000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:57:39.414000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:57:39.414000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:57:39.419000 audit: BPF prog-id=15 op=UNLOAD Jul 10 00:57:39.479000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:57:39.482000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:57:39.482000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:57:39.482000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:57:39.483000 audit: BPF prog-id=18 op=LOAD Jul 10 00:57:39.483000 audit: BPF prog-id=19 op=LOAD Jul 10 00:57:39.483000 audit: BPF prog-id=20 op=LOAD Jul 10 00:57:39.483000 audit: BPF prog-id=16 op=UNLOAD Jul 10 00:57:39.483000 audit: BPF prog-id=17 op=UNLOAD Jul 10 00:57:39.497000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:57:39.500000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Jul 10 00:57:39.500000 audit[1032]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=3 a1=7ffc883dccb0 a2=4000 a3=7ffc883dcd4c items=0 ppid=1 pid=1032 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:57:39.500000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Jul 10 00:57:39.508000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:57:39.510000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:57:39.510000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:57:39.510000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:57:39.513000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:57:39.513000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:57:39.513000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:57:39.513000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:57:39.513000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:57:39.513000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:57:39.514000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:57:39.514000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:57:39.407292 systemd[1]: Queued start job for default target multi-user.target. Jul 10 00:57:37.128125 /usr/lib/systemd/system-generators/torcx-generator[941]: time="2025-07-10T00:57:37Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" Jul 10 00:57:39.407301 systemd[1]: Unnecessary job was removed for dev-sda6.device. Jul 10 00:57:37.128560 /usr/lib/systemd/system-generators/torcx-generator[941]: time="2025-07-10T00:57:37Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Jul 10 00:57:39.411167 systemd[1]: systemd-journald.service: Deactivated successfully. Jul 10 00:57:37.128574 /usr/lib/systemd/system-generators/torcx-generator[941]: time="2025-07-10T00:57:37Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Jul 10 00:57:39.510664 systemd[1]: Mounted tmp.mount. Jul 10 00:57:37.128597 /usr/lib/systemd/system-generators/torcx-generator[941]: time="2025-07-10T00:57:37Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Jul 10 00:57:39.511369 systemd[1]: Finished kmod-static-nodes.service. Jul 10 00:57:37.128603 /usr/lib/systemd/system-generators/torcx-generator[941]: time="2025-07-10T00:57:37Z" level=debug msg="skipped missing lower profile" missing profile=oem Jul 10 00:57:39.511930 systemd[1]: modprobe@configfs.service: Deactivated successfully. Jul 10 00:57:37.128623 /usr/lib/systemd/system-generators/torcx-generator[941]: time="2025-07-10T00:57:37Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Jul 10 00:57:39.512032 systemd[1]: Finished modprobe@configfs.service. Jul 10 00:57:37.128630 /usr/lib/systemd/system-generators/torcx-generator[941]: time="2025-07-10T00:57:37Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Jul 10 00:57:39.512276 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Jul 10 00:57:37.128772 /usr/lib/systemd/system-generators/torcx-generator[941]: time="2025-07-10T00:57:37Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Jul 10 00:57:39.520369 jq[1007]: true Jul 10 00:57:39.512359 systemd[1]: Finished modprobe@dm_mod.service. Jul 10 00:57:37.128794 /usr/lib/systemd/system-generators/torcx-generator[941]: time="2025-07-10T00:57:37Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Jul 10 00:57:39.515067 systemd[1]: modprobe@drm.service: Deactivated successfully. Jul 10 00:57:37.128802 /usr/lib/systemd/system-generators/torcx-generator[941]: time="2025-07-10T00:57:37Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Jul 10 00:57:39.515151 systemd[1]: Finished modprobe@drm.service. Jul 10 00:57:37.129590 /usr/lib/systemd/system-generators/torcx-generator[941]: time="2025-07-10T00:57:37Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Jul 10 00:57:39.515425 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Jul 10 00:57:37.129613 /usr/lib/systemd/system-generators/torcx-generator[941]: time="2025-07-10T00:57:37Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Jul 10 00:57:39.515504 systemd[1]: Finished modprobe@efi_pstore.service. Jul 10 00:57:37.129625 /usr/lib/systemd/system-generators/torcx-generator[941]: time="2025-07-10T00:57:37Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.7: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.7 Jul 10 00:57:39.515784 systemd[1]: Finished systemd-modules-load.service. Jul 10 00:57:37.129634 /usr/lib/systemd/system-generators/torcx-generator[941]: time="2025-07-10T00:57:37Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Jul 10 00:57:39.516015 systemd[1]: Finished systemd-remount-fs.service. Jul 10 00:57:37.129643 /usr/lib/systemd/system-generators/torcx-generator[941]: time="2025-07-10T00:57:37Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.7: no such file or directory" path=/var/lib/torcx/store/3510.3.7 Jul 10 00:57:39.518215 systemd[1]: Mounting sys-kernel-config.mount... Jul 10 00:57:37.129651 /usr/lib/systemd/system-generators/torcx-generator[941]: time="2025-07-10T00:57:37Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Jul 10 00:57:39.518354 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Jul 10 00:57:39.116284 /usr/lib/systemd/system-generators/torcx-generator[941]: time="2025-07-10T00:57:39Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Jul 10 00:57:39.520576 systemd[1]: Starting systemd-hwdb-update.service... Jul 10 00:57:39.116753 /usr/lib/systemd/system-generators/torcx-generator[941]: time="2025-07-10T00:57:39Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Jul 10 00:57:39.116844 /usr/lib/systemd/system-generators/torcx-generator[941]: time="2025-07-10T00:57:39Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Jul 10 00:57:39.116992 /usr/lib/systemd/system-generators/torcx-generator[941]: time="2025-07-10T00:57:39Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Jul 10 00:57:39.521453 jq[1041]: true Jul 10 00:57:39.117038 /usr/lib/systemd/system-generators/torcx-generator[941]: time="2025-07-10T00:57:39Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Jul 10 00:57:39.117092 /usr/lib/systemd/system-generators/torcx-generator[941]: time="2025-07-10T00:57:39Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Jul 10 00:57:39.521539 systemd[1]: Starting systemd-journal-flush.service... Jul 10 00:57:39.521658 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Jul 10 00:57:39.526436 systemd[1]: Starting systemd-random-seed.service... Jul 10 00:57:39.528000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:57:39.534000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:57:39.527351 systemd[1]: Starting systemd-sysctl.service... Jul 10 00:57:39.538221 systemd-journald[1032]: Time spent on flushing to /var/log/journal/e37a69af5f144c5fbeace4719beeabe9 is 28.732ms for 1974 entries. Jul 10 00:57:39.538221 systemd-journald[1032]: System Journal (/var/log/journal/e37a69af5f144c5fbeace4719beeabe9) is 8.0M, max 584.8M, 576.8M free. Jul 10 00:57:39.572974 systemd-journald[1032]: Received client request to flush runtime journal. Jul 10 00:57:39.573007 kernel: fuse: init (API version 7.34) Jul 10 00:57:39.545000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:57:39.555000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:57:39.555000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:57:39.571000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:57:39.529769 systemd[1]: Finished systemd-network-generator.service. Jul 10 00:57:39.529973 systemd[1]: Mounted sys-kernel-config.mount. Jul 10 00:57:39.530214 systemd[1]: Reached target network-pre.target. Jul 10 00:57:39.536262 systemd[1]: Finished systemd-random-seed.service. Jul 10 00:57:39.536432 systemd[1]: Reached target first-boot-complete.target. Jul 10 00:57:39.547029 systemd[1]: Finished systemd-sysctl.service. Jul 10 00:57:39.557095 systemd[1]: modprobe@fuse.service: Deactivated successfully. Jul 10 00:57:39.557182 systemd[1]: Finished modprobe@fuse.service. Jul 10 00:57:39.558231 systemd[1]: Mounting sys-fs-fuse-connections.mount... Jul 10 00:57:39.560432 systemd[1]: Mounted sys-fs-fuse-connections.mount. Jul 10 00:57:39.573466 systemd[1]: Finished systemd-journal-flush.service. Jul 10 00:57:39.578015 kernel: loop: module loaded Jul 10 00:57:39.577000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:57:39.577000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:57:39.579037 systemd[1]: modprobe@loop.service: Deactivated successfully. Jul 10 00:57:39.579116 systemd[1]: Finished modprobe@loop.service. Jul 10 00:57:39.579296 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Jul 10 00:57:39.580000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:57:39.582175 systemd[1]: Finished flatcar-tmpfiles.service. Jul 10 00:57:39.583180 systemd[1]: Starting systemd-sysusers.service... Jul 10 00:57:39.646000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:57:39.648038 systemd[1]: Finished systemd-udev-trigger.service. Jul 10 00:57:39.649061 systemd[1]: Starting systemd-udev-settle.service... Jul 10 00:57:39.668495 udevadm[1070]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation.service, lvm2-activation-early.service not to pull it in. Jul 10 00:57:39.741000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:57:39.742936 systemd[1]: Finished systemd-sysusers.service. Jul 10 00:57:39.744006 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Jul 10 00:57:39.781624 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Jul 10 00:57:39.780000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:57:39.785957 ignition[1042]: Ignition 2.14.0 Jul 10 00:57:39.786238 ignition[1042]: deleting config from guestinfo properties Jul 10 00:57:39.789571 ignition[1042]: Successfully deleted config Jul 10 00:57:39.790154 systemd[1]: Finished ignition-delete-config.service. Jul 10 00:57:39.788000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ignition-delete-config comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:57:40.016014 systemd[1]: Finished systemd-hwdb-update.service. Jul 10 00:57:40.014000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:57:40.014000 audit: BPF prog-id=21 op=LOAD Jul 10 00:57:40.015000 audit: BPF prog-id=22 op=LOAD Jul 10 00:57:40.015000 audit: BPF prog-id=7 op=UNLOAD Jul 10 00:57:40.015000 audit: BPF prog-id=8 op=UNLOAD Jul 10 00:57:40.017175 systemd[1]: Starting systemd-udevd.service... Jul 10 00:57:40.028889 systemd-udevd[1073]: Using default interface naming scheme 'v252'. Jul 10 00:57:40.050000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:57:40.051000 audit: BPF prog-id=23 op=LOAD Jul 10 00:57:40.051982 systemd[1]: Started systemd-udevd.service. Jul 10 00:57:40.053299 systemd[1]: Starting systemd-networkd.service... Jul 10 00:57:40.065000 audit: BPF prog-id=24 op=LOAD Jul 10 00:57:40.065000 audit: BPF prog-id=25 op=LOAD Jul 10 00:57:40.065000 audit: BPF prog-id=26 op=LOAD Jul 10 00:57:40.067866 systemd[1]: Starting systemd-userdbd.service... Jul 10 00:57:40.088963 systemd[1]: Condition check resulted in dev-ttyS0.device being skipped. Jul 10 00:57:40.108000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:57:40.109919 systemd[1]: Started systemd-userdbd.service. Jul 10 00:57:40.112747 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input2 Jul 10 00:57:40.122757 kernel: ACPI: button: Power Button [PWRF] Jul 10 00:57:40.184000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:57:40.185258 systemd-networkd[1081]: lo: Link UP Jul 10 00:57:40.185263 systemd-networkd[1081]: lo: Gained carrier Jul 10 00:57:40.185573 systemd-networkd[1081]: Enumeration completed Jul 10 00:57:40.185625 systemd[1]: Started systemd-networkd.service. Jul 10 00:57:40.186099 systemd-networkd[1081]: ens192: Configuring with /etc/systemd/network/00-vmware.network. Jul 10 00:57:40.189014 kernel: vmxnet3 0000:0b:00.0 ens192: intr type 3, mode 0, 3 vectors allocated Jul 10 00:57:40.189140 kernel: vmxnet3 0000:0b:00.0 ens192: NIC Link is Up 10000 Mbps Jul 10 00:57:40.189744 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): ens192: link becomes ready Jul 10 00:57:40.190414 systemd-networkd[1081]: ens192: Link UP Jul 10 00:57:40.190596 systemd-networkd[1081]: ens192: Gained carrier Jul 10 00:57:40.191408 kernel: vmw_vmci 0000:00:07.7: Found VMCI PCI device at 0x11080, irq 16 Jul 10 00:57:40.192885 kernel: vmw_vmci 0000:00:07.7: Using capabilities 0xc Jul 10 00:57:40.192980 kernel: Guest personality initialized and is active Jul 10 00:57:40.194278 kernel: VMCI host device registered (name=vmci, major=10, minor=125) Jul 10 00:57:40.194302 kernel: Initialized host personality Jul 10 00:57:40.182000 audit[1078]: AVC avc: denied { confidentiality } for pid=1078 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Jul 10 00:57:40.182000 audit[1078]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55c2e20c0960 a1=338ac a2=7fab9d53abc5 a3=5 items=110 ppid=1073 pid=1078 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:57:40.182000 audit: CWD cwd="/" Jul 10 00:57:40.182000 audit: PATH item=0 name=(null) inode=45 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:57:40.182000 audit: PATH item=1 name=(null) inode=19743 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:57:40.182000 audit: PATH item=2 name=(null) inode=19743 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:57:40.182000 audit: PATH item=3 name=(null) inode=19744 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:57:40.182000 audit: PATH item=4 name=(null) inode=19743 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:57:40.182000 audit: PATH item=5 name=(null) inode=19745 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:57:40.182000 audit: PATH item=6 name=(null) inode=19743 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:57:40.182000 audit: PATH item=7 name=(null) inode=19746 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:57:40.182000 audit: PATH item=8 name=(null) inode=19746 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:57:40.182000 audit: PATH item=9 name=(null) inode=19747 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:57:40.182000 audit: PATH item=10 name=(null) inode=19746 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:57:40.182000 audit: PATH item=11 name=(null) inode=19748 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:57:40.182000 audit: PATH item=12 name=(null) inode=19746 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:57:40.182000 audit: PATH item=13 name=(null) inode=19749 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:57:40.182000 audit: PATH item=14 name=(null) inode=19746 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:57:40.182000 audit: PATH item=15 name=(null) inode=19750 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:57:40.182000 audit: PATH item=16 name=(null) inode=19746 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:57:40.182000 audit: PATH item=17 name=(null) inode=19751 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:57:40.182000 audit: PATH item=18 name=(null) inode=19743 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:57:40.182000 audit: PATH item=19 name=(null) inode=19752 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:57:40.182000 audit: PATH item=20 name=(null) inode=19752 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:57:40.182000 audit: PATH item=21 name=(null) inode=19753 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:57:40.182000 audit: PATH item=22 name=(null) inode=19752 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:57:40.182000 audit: PATH item=23 name=(null) inode=19754 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:57:40.182000 audit: PATH item=24 name=(null) inode=19752 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:57:40.182000 audit: PATH item=25 name=(null) inode=19755 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:57:40.182000 audit: PATH item=26 name=(null) inode=19752 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:57:40.182000 audit: PATH item=27 name=(null) inode=19756 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:57:40.182000 audit: PATH item=28 name=(null) inode=19752 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:57:40.182000 audit: PATH item=29 name=(null) inode=19757 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:57:40.182000 audit: PATH item=30 name=(null) inode=19743 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:57:40.182000 audit: PATH item=31 name=(null) inode=19758 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:57:40.182000 audit: PATH item=32 name=(null) inode=19758 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:57:40.182000 audit: PATH item=33 name=(null) inode=19759 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:57:40.182000 audit: PATH item=34 name=(null) inode=19758 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:57:40.182000 audit: PATH item=35 name=(null) inode=19760 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:57:40.182000 audit: PATH item=36 name=(null) inode=19758 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:57:40.182000 audit: PATH item=37 name=(null) inode=19761 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:57:40.182000 audit: PATH item=38 name=(null) inode=19758 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:57:40.182000 audit: PATH item=39 name=(null) inode=19762 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:57:40.182000 audit: PATH item=40 name=(null) inode=19758 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:57:40.182000 audit: PATH item=41 name=(null) inode=19763 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:57:40.182000 audit: PATH item=42 name=(null) inode=19743 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:57:40.182000 audit: PATH item=43 name=(null) inode=19764 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:57:40.182000 audit: PATH item=44 name=(null) inode=19764 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:57:40.182000 audit: PATH item=45 name=(null) inode=19765 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:57:40.182000 audit: PATH item=46 name=(null) inode=19764 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:57:40.182000 audit: PATH item=47 name=(null) inode=19766 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:57:40.182000 audit: PATH item=48 name=(null) inode=19764 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:57:40.182000 audit: PATH item=49 name=(null) inode=19767 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:57:40.182000 audit: PATH item=50 name=(null) inode=19764 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:57:40.182000 audit: PATH item=51 name=(null) inode=19768 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:57:40.182000 audit: PATH item=52 name=(null) inode=19764 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:57:40.182000 audit: PATH item=53 name=(null) inode=19769 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:57:40.182000 audit: PATH item=54 name=(null) inode=45 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:57:40.182000 audit: PATH item=55 name=(null) inode=19770 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:57:40.182000 audit: PATH item=56 name=(null) inode=19770 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:57:40.182000 audit: PATH item=57 name=(null) inode=19771 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:57:40.182000 audit: PATH item=58 name=(null) inode=19770 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:57:40.182000 audit: PATH item=59 name=(null) inode=19772 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:57:40.182000 audit: PATH item=60 name=(null) inode=19770 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:57:40.182000 audit: PATH item=61 name=(null) inode=19773 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:57:40.182000 audit: PATH item=62 name=(null) inode=19773 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:57:40.182000 audit: PATH item=63 name=(null) inode=19774 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:57:40.182000 audit: PATH item=64 name=(null) inode=19773 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:57:40.182000 audit: PATH item=65 name=(null) inode=19775 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:57:40.182000 audit: PATH item=66 name=(null) inode=19773 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:57:40.182000 audit: PATH item=67 name=(null) inode=19776 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:57:40.182000 audit: PATH item=68 name=(null) inode=19773 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:57:40.182000 audit: PATH item=69 name=(null) inode=19777 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:57:40.182000 audit: PATH item=70 name=(null) inode=19773 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:57:40.182000 audit: PATH item=71 name=(null) inode=19778 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:57:40.182000 audit: PATH item=72 name=(null) inode=19770 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:57:40.182000 audit: PATH item=73 name=(null) inode=19779 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:57:40.182000 audit: PATH item=74 name=(null) inode=19779 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:57:40.182000 audit: PATH item=75 name=(null) inode=19780 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:57:40.182000 audit: PATH item=76 name=(null) inode=19779 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:57:40.182000 audit: PATH item=77 name=(null) inode=19781 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:57:40.182000 audit: PATH item=78 name=(null) inode=19779 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:57:40.182000 audit: PATH item=79 name=(null) inode=19782 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:57:40.182000 audit: PATH item=80 name=(null) inode=19779 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:57:40.182000 audit: PATH item=81 name=(null) inode=19783 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:57:40.182000 audit: PATH item=82 name=(null) inode=19779 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:57:40.182000 audit: PATH item=83 name=(null) inode=19784 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:57:40.182000 audit: PATH item=84 name=(null) inode=19770 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:57:40.182000 audit: PATH item=85 name=(null) inode=19785 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:57:40.182000 audit: PATH item=86 name=(null) inode=19785 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:57:40.182000 audit: PATH item=87 name=(null) inode=19786 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:57:40.182000 audit: PATH item=88 name=(null) inode=19785 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:57:40.182000 audit: PATH item=89 name=(null) inode=19787 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:57:40.182000 audit: PATH item=90 name=(null) inode=19785 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:57:40.182000 audit: PATH item=91 name=(null) inode=19788 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:57:40.182000 audit: PATH item=92 name=(null) inode=19785 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:57:40.182000 audit: PATH item=93 name=(null) inode=19789 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:57:40.182000 audit: PATH item=94 name=(null) inode=19785 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:57:40.182000 audit: PATH item=95 name=(null) inode=19790 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:57:40.182000 audit: PATH item=96 name=(null) inode=19770 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:57:40.182000 audit: PATH item=97 name=(null) inode=19791 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:57:40.182000 audit: PATH item=98 name=(null) inode=19791 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:57:40.182000 audit: PATH item=99 name=(null) inode=19792 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:57:40.182000 audit: PATH item=100 name=(null) inode=19791 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:57:40.182000 audit: PATH item=101 name=(null) inode=19793 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:57:40.182000 audit: PATH item=102 name=(null) inode=19791 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:57:40.182000 audit: PATH item=103 name=(null) inode=19794 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:57:40.182000 audit: PATH item=104 name=(null) inode=19791 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:57:40.182000 audit: PATH item=105 name=(null) inode=19795 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:57:40.182000 audit: PATH item=106 name=(null) inode=19791 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:57:40.182000 audit: PATH item=107 name=(null) inode=19796 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:57:40.182000 audit: PATH item=108 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:57:40.182000 audit: PATH item=109 name=(null) inode=19797 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:57:40.182000 audit: PROCTITLE proctitle="(udev-worker)" Jul 10 00:57:40.228749 kernel: input: ImPS/2 Generic Wheel Mouse as /devices/platform/i8042/serio1/input/input3 Jul 10 00:57:40.241751 kernel: piix4_smbus 0000:00:07.3: SMBus Host Controller not enabled! Jul 10 00:57:40.249748 kernel: mousedev: PS/2 mouse device common for all mice Jul 10 00:57:40.251094 (udev-worker)[1083]: id: Truncating stdout of 'dmi_memory_id' up to 16384 byte. Jul 10 00:57:40.253150 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Jul 10 00:57:40.283955 systemd[1]: Finished systemd-udev-settle.service. Jul 10 00:57:40.282000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:57:40.285001 systemd[1]: Starting lvm2-activation-early.service... Jul 10 00:57:40.305219 lvm[1106]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Jul 10 00:57:40.327328 systemd[1]: Finished lvm2-activation-early.service. Jul 10 00:57:40.325000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:57:40.327518 systemd[1]: Reached target cryptsetup.target. Jul 10 00:57:40.328439 systemd[1]: Starting lvm2-activation.service... Jul 10 00:57:40.330557 lvm[1107]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Jul 10 00:57:40.357250 systemd[1]: Finished lvm2-activation.service. Jul 10 00:57:40.355000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:57:40.357441 systemd[1]: Reached target local-fs-pre.target. Jul 10 00:57:40.358192 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Jul 10 00:57:40.364000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:57:40.365937 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Jul 10 00:57:40.502104 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Jul 10 00:57:40.502123 systemd[1]: Reached target local-fs.target. Jul 10 00:57:40.502242 systemd[1]: Reached target machines.target. Jul 10 00:57:40.503272 systemd[1]: Starting ldconfig.service... Jul 10 00:57:40.503867 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Jul 10 00:57:40.503897 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Jul 10 00:57:40.504627 systemd[1]: Starting systemd-boot-update.service... Jul 10 00:57:40.505437 systemd[1]: Starting systemd-machine-id-commit.service... Jul 10 00:57:40.506310 systemd[1]: Starting systemd-sysext.service... Jul 10 00:57:40.515438 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1111 (bootctl) Jul 10 00:57:40.516185 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Jul 10 00:57:40.526511 systemd[1]: Unmounting usr-share-oem.mount... Jul 10 00:57:40.540782 systemd[1]: usr-share-oem.mount: Deactivated successfully. Jul 10 00:57:40.540903 systemd[1]: Unmounted usr-share-oem.mount. Jul 10 00:57:40.563760 kernel: loop0: detected capacity change from 0 to 224512 Jul 10 00:57:40.962415 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Jul 10 00:57:40.961000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:57:40.963249 systemd[1]: Finished systemd-machine-id-commit.service. Jul 10 00:57:41.089753 kernel: squashfs: version 4.0 (2009/01/31) Phillip Lougher Jul 10 00:57:41.157755 systemd-fsck[1118]: fsck.fat 4.2 (2021-01-31) Jul 10 00:57:41.157755 systemd-fsck[1118]: /dev/sda1: 790 files, 120731/258078 clusters Jul 10 00:57:41.160273 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Jul 10 00:57:41.158000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:57:41.161763 systemd[1]: Mounting boot.mount... Jul 10 00:57:41.167751 kernel: loop1: detected capacity change from 0 to 224512 Jul 10 00:57:41.175556 systemd[1]: Mounted boot.mount. Jul 10 00:57:41.185713 systemd[1]: Finished systemd-boot-update.service. Jul 10 00:57:41.184000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:57:41.189291 kernel: kauditd_printk_skb: 235 callbacks suppressed Jul 10 00:57:41.189341 kernel: audit: type=1130 audit(1752109061.184:158): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:57:41.190977 (sd-sysext)[1123]: Using extensions 'kubernetes'. Jul 10 00:57:41.191226 (sd-sysext)[1123]: Merged extensions into '/usr'. Jul 10 00:57:41.215318 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Jul 10 00:57:41.216696 systemd[1]: Mounting usr-share-oem.mount... Jul 10 00:57:41.217650 systemd[1]: Starting modprobe@dm_mod.service... Jul 10 00:57:41.219708 systemd[1]: Starting modprobe@efi_pstore.service... Jul 10 00:57:41.220999 systemd[1]: Starting modprobe@loop.service... Jul 10 00:57:41.221136 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Jul 10 00:57:41.221224 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Jul 10 00:57:41.221299 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Jul 10 00:57:41.222749 systemd[1]: Mounted usr-share-oem.mount. Jul 10 00:57:41.223225 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Jul 10 00:57:41.223307 systemd[1]: Finished modprobe@dm_mod.service. Jul 10 00:57:41.221000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:57:41.223612 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Jul 10 00:57:41.223678 systemd[1]: Finished modprobe@efi_pstore.service. Jul 10 00:57:41.226763 kernel: audit: type=1130 audit(1752109061.221:159): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:57:41.226795 kernel: audit: type=1131 audit(1752109061.221:160): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:57:41.221000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:57:41.227000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:57:41.229107 systemd[1]: modprobe@loop.service: Deactivated successfully. Jul 10 00:57:41.229180 systemd[1]: Finished modprobe@loop.service. Jul 10 00:57:41.227000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:57:41.232534 systemd[1]: Finished systemd-sysext.service. Jul 10 00:57:41.234206 kernel: audit: type=1130 audit(1752109061.227:161): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:57:41.234244 kernel: audit: type=1131 audit(1752109061.227:162): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:57:41.230000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:57:41.230000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:57:41.236963 kernel: audit: type=1130 audit(1752109061.230:163): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:57:41.236997 kernel: audit: type=1131 audit(1752109061.230:164): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:57:41.238000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:57:41.242863 kernel: audit: type=1130 audit(1752109061.238:165): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:57:41.241520 systemd[1]: Starting ensure-sysext.service... Jul 10 00:57:41.243203 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Jul 10 00:57:41.243243 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Jul 10 00:57:41.244152 systemd[1]: Starting systemd-tmpfiles-setup.service... Jul 10 00:57:41.246251 systemd[1]: Reloading. Jul 10 00:57:41.255423 systemd-tmpfiles[1130]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Jul 10 00:57:41.257455 systemd-tmpfiles[1130]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Jul 10 00:57:41.258899 systemd-tmpfiles[1130]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Jul 10 00:57:41.291741 /usr/lib/systemd/system-generators/torcx-generator[1149]: time="2025-07-10T00:57:41Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" Jul 10 00:57:41.291760 /usr/lib/systemd/system-generators/torcx-generator[1149]: time="2025-07-10T00:57:41Z" level=info msg="torcx already run" Jul 10 00:57:41.356931 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Jul 10 00:57:41.356942 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Jul 10 00:57:41.379652 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Jul 10 00:57:41.412000 audit: BPF prog-id=27 op=LOAD Jul 10 00:57:41.413000 audit: BPF prog-id=23 op=UNLOAD Jul 10 00:57:41.415776 kernel: audit: type=1334 audit(1752109061.412:166): prog-id=27 op=LOAD Jul 10 00:57:41.415815 kernel: audit: type=1334 audit(1752109061.413:167): prog-id=23 op=UNLOAD Jul 10 00:57:41.414000 audit: BPF prog-id=28 op=LOAD Jul 10 00:57:41.414000 audit: BPF prog-id=29 op=LOAD Jul 10 00:57:41.414000 audit: BPF prog-id=21 op=UNLOAD Jul 10 00:57:41.414000 audit: BPF prog-id=22 op=UNLOAD Jul 10 00:57:41.415000 audit: BPF prog-id=30 op=LOAD Jul 10 00:57:41.415000 audit: BPF prog-id=18 op=UNLOAD Jul 10 00:57:41.415000 audit: BPF prog-id=31 op=LOAD Jul 10 00:57:41.415000 audit: BPF prog-id=32 op=LOAD Jul 10 00:57:41.415000 audit: BPF prog-id=19 op=UNLOAD Jul 10 00:57:41.415000 audit: BPF prog-id=20 op=UNLOAD Jul 10 00:57:41.416000 audit: BPF prog-id=33 op=LOAD Jul 10 00:57:41.416000 audit: BPF prog-id=24 op=UNLOAD Jul 10 00:57:41.416000 audit: BPF prog-id=34 op=LOAD Jul 10 00:57:41.416000 audit: BPF prog-id=35 op=LOAD Jul 10 00:57:41.416000 audit: BPF prog-id=25 op=UNLOAD Jul 10 00:57:41.416000 audit: BPF prog-id=26 op=UNLOAD Jul 10 00:57:41.426334 systemd[1]: Starting modprobe@dm_mod.service... Jul 10 00:57:41.427711 systemd[1]: Starting modprobe@efi_pstore.service... Jul 10 00:57:41.429067 systemd[1]: Starting modprobe@loop.service... Jul 10 00:57:41.429262 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Jul 10 00:57:41.429337 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Jul 10 00:57:41.428000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:57:41.428000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:57:41.429857 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Jul 10 00:57:41.429933 systemd[1]: Finished modprobe@dm_mod.service. Jul 10 00:57:41.430304 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Jul 10 00:57:41.430374 systemd[1]: Finished modprobe@efi_pstore.service. Jul 10 00:57:41.428000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:57:41.428000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:57:41.430656 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Jul 10 00:57:41.430860 systemd[1]: modprobe@loop.service: Deactivated successfully. Jul 10 00:57:41.429000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:57:41.429000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:57:41.430924 systemd[1]: Finished modprobe@loop.service. Jul 10 00:57:41.431228 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Jul 10 00:57:41.432103 systemd[1]: Finished systemd-tmpfiles-setup.service. Jul 10 00:57:41.430000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:57:41.435152 systemd[1]: Finished ensure-sysext.service. Jul 10 00:57:41.433000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ensure-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:57:41.436774 systemd[1]: Starting audit-rules.service... Jul 10 00:57:41.437563 systemd[1]: Starting clean-ca-certificates.service... Jul 10 00:57:41.438265 systemd[1]: Starting modprobe@dm_mod.service... Jul 10 00:57:41.438950 systemd[1]: Starting modprobe@drm.service... Jul 10 00:57:41.439619 systemd[1]: Starting modprobe@efi_pstore.service... Jul 10 00:57:41.442001 systemd[1]: Starting modprobe@loop.service... Jul 10 00:57:41.442285 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Jul 10 00:57:41.442320 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Jul 10 00:57:41.443183 systemd[1]: Starting systemd-journal-catalog-update.service... Jul 10 00:57:41.444222 systemd[1]: Starting systemd-networkd-wait-online.service... Jul 10 00:57:41.443000 audit: BPF prog-id=36 op=LOAD Jul 10 00:57:41.446264 systemd[1]: Starting systemd-resolved.service... Jul 10 00:57:41.446000 audit: BPF prog-id=37 op=LOAD Jul 10 00:57:41.449048 systemd[1]: Starting systemd-timesyncd.service... Jul 10 00:57:41.451424 systemd[1]: Starting systemd-update-utmp.service... Jul 10 00:57:41.453234 systemd[1]: Finished clean-ca-certificates.service. Jul 10 00:57:41.452000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:57:41.453992 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Jul 10 00:57:41.454091 systemd[1]: Finished modprobe@dm_mod.service. Jul 10 00:57:41.452000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:57:41.452000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:57:41.454357 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Jul 10 00:57:41.454433 systemd[1]: Finished modprobe@efi_pstore.service. Jul 10 00:57:41.453000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:57:41.453000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:57:41.454951 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Jul 10 00:57:41.455327 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Jul 10 00:57:41.460696 systemd[1]: modprobe@drm.service: Deactivated successfully. Jul 10 00:57:41.460811 systemd[1]: Finished modprobe@drm.service. Jul 10 00:57:41.459000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:57:41.459000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:57:41.461000 audit[1229]: SYSTEM_BOOT pid=1229 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Jul 10 00:57:41.465528 systemd[1]: Finished systemd-update-utmp.service. Jul 10 00:57:41.463000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:57:41.467269 systemd[1]: modprobe@loop.service: Deactivated successfully. Jul 10 00:57:41.467352 systemd[1]: Finished modprobe@loop.service. Jul 10 00:57:41.467540 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Jul 10 00:57:41.465000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:57:41.465000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:57:41.502089 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Jul 10 00:57:41.502109 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Jul 10 00:57:41.516475 systemd[1]: Started systemd-timesyncd.service. Jul 10 00:57:41.514000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-timesyncd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:57:41.516637 systemd[1]: Reached target time-set.target. Jul 10 00:57:41.536926 systemd-resolved[1222]: Positive Trust Anchors: Jul 10 00:57:41.536940 systemd-resolved[1222]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Jul 10 00:57:41.536965 systemd-resolved[1222]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Jul 10 00:57:41.550645 systemd[1]: Finished systemd-journal-catalog-update.service. Jul 10 00:57:41.549000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:57:41.566000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Jul 10 00:57:41.566000 audit[1239]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7fffbc3320f0 a2=420 a3=0 items=0 ppid=1213 pid=1239 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:57:41.566000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Jul 10 00:57:41.568075 augenrules[1239]: No rules Jul 10 00:57:41.568308 systemd[1]: Finished audit-rules.service. Jul 10 00:59:07.435084 systemd-timesyncd[1226]: Contacted time server 23.155.72.147:123 (0.flatcar.pool.ntp.org). Jul 10 00:59:07.435125 systemd-timesyncd[1226]: Initial clock synchronization to Thu 2025-07-10 00:59:07.435011 UTC. Jul 10 00:59:07.507181 systemd-resolved[1222]: Defaulting to hostname 'linux'. Jul 10 00:59:07.508234 systemd[1]: Started systemd-resolved.service. Jul 10 00:59:07.508382 systemd[1]: Reached target network.target. Jul 10 00:59:07.508475 systemd[1]: Reached target nss-lookup.target. Jul 10 00:59:07.736508 systemd-networkd[1081]: ens192: Gained IPv6LL Jul 10 00:59:07.737684 systemd[1]: Finished systemd-networkd-wait-online.service. Jul 10 00:59:07.737847 systemd[1]: Reached target network-online.target. Jul 10 00:59:07.744044 ldconfig[1110]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Jul 10 00:59:07.760033 systemd[1]: Finished ldconfig.service. Jul 10 00:59:07.761082 systemd[1]: Starting systemd-update-done.service... Jul 10 00:59:07.767459 systemd[1]: Finished systemd-update-done.service. Jul 10 00:59:07.767611 systemd[1]: Reached target sysinit.target. Jul 10 00:59:07.767783 systemd[1]: Started motdgen.path. Jul 10 00:59:07.767879 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Jul 10 00:59:07.768055 systemd[1]: Started logrotate.timer. Jul 10 00:59:07.768185 systemd[1]: Started mdadm.timer. Jul 10 00:59:07.768263 systemd[1]: Started systemd-tmpfiles-clean.timer. Jul 10 00:59:07.768350 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Jul 10 00:59:07.768364 systemd[1]: Reached target paths.target. Jul 10 00:59:07.768452 systemd[1]: Reached target timers.target. Jul 10 00:59:07.768677 systemd[1]: Listening on dbus.socket. Jul 10 00:59:07.769449 systemd[1]: Starting docker.socket... Jul 10 00:59:07.780018 systemd[1]: Listening on sshd.socket. Jul 10 00:59:07.780179 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Jul 10 00:59:07.780549 systemd[1]: Listening on docker.socket. Jul 10 00:59:07.780688 systemd[1]: Reached target sockets.target. Jul 10 00:59:07.780775 systemd[1]: Reached target basic.target. Jul 10 00:59:07.780880 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Jul 10 00:59:07.780893 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Jul 10 00:59:07.781585 systemd[1]: Starting containerd.service... Jul 10 00:59:07.782359 systemd[1]: Starting dbus.service... Jul 10 00:59:07.783341 systemd[1]: Starting enable-oem-cloudinit.service... Jul 10 00:59:07.784331 systemd[1]: Starting extend-filesystems.service... Jul 10 00:59:07.784853 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Jul 10 00:59:07.785463 jq[1249]: false Jul 10 00:59:07.789502 systemd[1]: Starting kubelet.service... Jul 10 00:59:07.790281 systemd[1]: Starting motdgen.service... Jul 10 00:59:07.791091 systemd[1]: Starting ssh-key-proc-cmdline.service... Jul 10 00:59:07.791904 systemd[1]: Starting sshd-keygen.service... Jul 10 00:59:07.795546 systemd[1]: Starting systemd-logind.service... Jul 10 00:59:07.795658 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Jul 10 00:59:07.795694 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). Jul 10 00:59:07.796134 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Jul 10 00:59:07.796515 systemd[1]: Starting update-engine.service... Jul 10 00:59:07.797313 systemd[1]: Starting update-ssh-keys-after-ignition.service... Jul 10 00:59:07.798214 systemd[1]: Starting vmtoolsd.service... Jul 10 00:59:07.799128 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Jul 10 00:59:07.799236 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Jul 10 00:59:07.807547 jq[1259]: true Jul 10 00:59:07.810588 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Jul 10 00:59:07.810686 systemd[1]: Finished ssh-key-proc-cmdline.service. Jul 10 00:59:07.813862 jq[1264]: true Jul 10 00:59:07.828976 extend-filesystems[1250]: Found loop1 Jul 10 00:59:07.830794 systemd[1]: Started vmtoolsd.service. Jul 10 00:59:07.831140 systemd[1]: motdgen.service: Deactivated successfully. Jul 10 00:59:07.831270 systemd[1]: Finished motdgen.service. Jul 10 00:59:07.834341 extend-filesystems[1250]: Found sda Jul 10 00:59:07.834341 extend-filesystems[1250]: Found sda1 Jul 10 00:59:07.834341 extend-filesystems[1250]: Found sda2 Jul 10 00:59:07.834341 extend-filesystems[1250]: Found sda3 Jul 10 00:59:07.834341 extend-filesystems[1250]: Found usr Jul 10 00:59:07.834341 extend-filesystems[1250]: Found sda4 Jul 10 00:59:07.834341 extend-filesystems[1250]: Found sda6 Jul 10 00:59:07.834341 extend-filesystems[1250]: Found sda7 Jul 10 00:59:07.834341 extend-filesystems[1250]: Found sda9 Jul 10 00:59:07.834341 extend-filesystems[1250]: Checking size of /dev/sda9 Jul 10 00:59:07.855424 extend-filesystems[1250]: Old size kept for /dev/sda9 Jul 10 00:59:07.855424 extend-filesystems[1250]: Found sr0 Jul 10 00:59:07.855346 systemd[1]: extend-filesystems.service: Deactivated successfully. Jul 10 00:59:07.855467 systemd[1]: Finished extend-filesystems.service. Jul 10 00:59:07.862311 systemd-logind[1255]: Watching system buttons on /dev/input/event1 (Power Button) Jul 10 00:59:07.862325 systemd-logind[1255]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard) Jul 10 00:59:07.866463 systemd-logind[1255]: New seat seat0. Jul 10 00:59:07.872395 bash[1284]: Updated "/home/core/.ssh/authorized_keys" Jul 10 00:59:07.872791 systemd[1]: Finished update-ssh-keys-after-ignition.service. Jul 10 00:59:07.878430 dbus-daemon[1248]: [system] SELinux support is enabled Jul 10 00:59:07.878530 systemd[1]: Started dbus.service. Jul 10 00:59:07.879809 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Jul 10 00:59:07.879836 systemd[1]: Reached target system-config.target. Jul 10 00:59:07.879950 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Jul 10 00:59:07.879959 systemd[1]: Reached target user-config.target. Jul 10 00:59:07.882319 systemd[1]: Started systemd-logind.service. Jul 10 00:59:07.908424 kernel: NET: Registered PF_VSOCK protocol family Jul 10 00:59:07.919853 env[1286]: time="2025-07-10T00:59:07.919823682Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Jul 10 00:59:07.946877 update_engine[1258]: I0710 00:59:07.941533 1258 main.cc:92] Flatcar Update Engine starting Jul 10 00:59:07.950061 env[1286]: time="2025-07-10T00:59:07.950032075Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Jul 10 00:59:07.950238 env[1286]: time="2025-07-10T00:59:07.950226158Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Jul 10 00:59:07.951220 env[1286]: time="2025-07-10T00:59:07.951201247Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.186-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Jul 10 00:59:07.951286 env[1286]: time="2025-07-10T00:59:07.951274630Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Jul 10 00:59:07.951460 env[1286]: time="2025-07-10T00:59:07.951447295Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Jul 10 00:59:07.951510 env[1286]: time="2025-07-10T00:59:07.951498919Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Jul 10 00:59:07.951562 env[1286]: time="2025-07-10T00:59:07.951548566Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Jul 10 00:59:07.951607 env[1286]: time="2025-07-10T00:59:07.951597139Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Jul 10 00:59:07.951699 env[1286]: time="2025-07-10T00:59:07.951688865Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Jul 10 00:59:07.951901 env[1286]: time="2025-07-10T00:59:07.951891365Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Jul 10 00:59:07.952020 env[1286]: time="2025-07-10T00:59:07.952007841Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Jul 10 00:59:07.952070 env[1286]: time="2025-07-10T00:59:07.952060246Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Jul 10 00:59:07.952148 env[1286]: time="2025-07-10T00:59:07.952137927Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Jul 10 00:59:07.952208 env[1286]: time="2025-07-10T00:59:07.952195723Z" level=info msg="metadata content store policy set" policy=shared Jul 10 00:59:07.956981 systemd[1]: Started update-engine.service. Jul 10 00:59:07.957169 update_engine[1258]: I0710 00:59:07.957011 1258 update_check_scheduler.cc:74] Next update check in 5m10s Jul 10 00:59:07.958711 systemd[1]: Started locksmithd.service. Jul 10 00:59:07.969244 env[1286]: time="2025-07-10T00:59:07.969213917Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Jul 10 00:59:07.969325 env[1286]: time="2025-07-10T00:59:07.969249918Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Jul 10 00:59:07.969325 env[1286]: time="2025-07-10T00:59:07.969274393Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Jul 10 00:59:07.969325 env[1286]: time="2025-07-10T00:59:07.969295149Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Jul 10 00:59:07.969325 env[1286]: time="2025-07-10T00:59:07.969304605Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Jul 10 00:59:07.969325 env[1286]: time="2025-07-10T00:59:07.969312707Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Jul 10 00:59:07.969325 env[1286]: time="2025-07-10T00:59:07.969320519Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Jul 10 00:59:07.969436 env[1286]: time="2025-07-10T00:59:07.969340018Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Jul 10 00:59:07.969436 env[1286]: time="2025-07-10T00:59:07.969350723Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Jul 10 00:59:07.969436 env[1286]: time="2025-07-10T00:59:07.969358490Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Jul 10 00:59:07.969436 env[1286]: time="2025-07-10T00:59:07.969365660Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Jul 10 00:59:07.969436 env[1286]: time="2025-07-10T00:59:07.969373896Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Jul 10 00:59:07.969715 env[1286]: time="2025-07-10T00:59:07.969499745Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Jul 10 00:59:07.969715 env[1286]: time="2025-07-10T00:59:07.969572244Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Jul 10 00:59:07.969765 env[1286]: time="2025-07-10T00:59:07.969739480Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Jul 10 00:59:07.969787 env[1286]: time="2025-07-10T00:59:07.969757127Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Jul 10 00:59:07.969787 env[1286]: time="2025-07-10T00:59:07.969775909Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Jul 10 00:59:07.969818 env[1286]: time="2025-07-10T00:59:07.969811105Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Jul 10 00:59:07.969834 env[1286]: time="2025-07-10T00:59:07.969820071Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Jul 10 00:59:07.969834 env[1286]: time="2025-07-10T00:59:07.969827501Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Jul 10 00:59:07.969868 env[1286]: time="2025-07-10T00:59:07.969834133Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Jul 10 00:59:07.969868 env[1286]: time="2025-07-10T00:59:07.969841024Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Jul 10 00:59:07.969868 env[1286]: time="2025-07-10T00:59:07.969848832Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Jul 10 00:59:07.969868 env[1286]: time="2025-07-10T00:59:07.969860773Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Jul 10 00:59:07.969929 env[1286]: time="2025-07-10T00:59:07.969868531Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Jul 10 00:59:07.969929 env[1286]: time="2025-07-10T00:59:07.969876169Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Jul 10 00:59:07.970613 env[1286]: time="2025-07-10T00:59:07.969991663Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Jul 10 00:59:07.970613 env[1286]: time="2025-07-10T00:59:07.970003782Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Jul 10 00:59:07.970613 env[1286]: time="2025-07-10T00:59:07.970011572Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Jul 10 00:59:07.970613 env[1286]: time="2025-07-10T00:59:07.970017950Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Jul 10 00:59:07.970613 env[1286]: time="2025-07-10T00:59:07.970027697Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Jul 10 00:59:07.970613 env[1286]: time="2025-07-10T00:59:07.970034761Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Jul 10 00:59:07.970613 env[1286]: time="2025-07-10T00:59:07.970046468Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Jul 10 00:59:07.970613 env[1286]: time="2025-07-10T00:59:07.970073539Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Jul 10 00:59:07.970765 env[1286]: time="2025-07-10T00:59:07.970195156Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Jul 10 00:59:07.970765 env[1286]: time="2025-07-10T00:59:07.970228027Z" level=info msg="Connect containerd service" Jul 10 00:59:07.970765 env[1286]: time="2025-07-10T00:59:07.970249420Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Jul 10 00:59:07.970765 env[1286]: time="2025-07-10T00:59:07.970613916Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Jul 10 00:59:07.973502 env[1286]: time="2025-07-10T00:59:07.970794377Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Jul 10 00:59:07.973502 env[1286]: time="2025-07-10T00:59:07.970818260Z" level=info msg=serving... address=/run/containerd/containerd.sock Jul 10 00:59:07.973502 env[1286]: time="2025-07-10T00:59:07.971370051Z" level=info msg="Start subscribing containerd event" Jul 10 00:59:07.973502 env[1286]: time="2025-07-10T00:59:07.971418110Z" level=info msg="Start recovering state" Jul 10 00:59:07.973502 env[1286]: time="2025-07-10T00:59:07.971456972Z" level=info msg="Start event monitor" Jul 10 00:59:07.973502 env[1286]: time="2025-07-10T00:59:07.971468593Z" level=info msg="Start snapshots syncer" Jul 10 00:59:07.973502 env[1286]: time="2025-07-10T00:59:07.971474296Z" level=info msg="Start cni network conf syncer for default" Jul 10 00:59:07.973502 env[1286]: time="2025-07-10T00:59:07.971479137Z" level=info msg="Start streaming server" Jul 10 00:59:07.970899 systemd[1]: Started containerd.service. Jul 10 00:59:07.974731 env[1286]: time="2025-07-10T00:59:07.974452478Z" level=info msg="containerd successfully booted in 0.055976s" Jul 10 00:59:08.154786 locksmithd[1310]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Jul 10 00:59:08.612532 sshd_keygen[1269]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Jul 10 00:59:08.627190 systemd[1]: Finished sshd-keygen.service. Jul 10 00:59:08.628480 systemd[1]: Starting issuegen.service... Jul 10 00:59:08.632039 systemd[1]: issuegen.service: Deactivated successfully. Jul 10 00:59:08.632137 systemd[1]: Finished issuegen.service. Jul 10 00:59:08.633239 systemd[1]: Starting systemd-user-sessions.service... Jul 10 00:59:08.637025 systemd[1]: Finished systemd-user-sessions.service. Jul 10 00:59:08.637958 systemd[1]: Started getty@tty1.service. Jul 10 00:59:08.638869 systemd[1]: Started serial-getty@ttyS0.service. Jul 10 00:59:08.639060 systemd[1]: Reached target getty.target. Jul 10 00:59:09.017678 systemd[1]: Started kubelet.service. Jul 10 00:59:09.018004 systemd[1]: Reached target multi-user.target. Jul 10 00:59:09.018981 systemd[1]: Starting systemd-update-utmp-runlevel.service... Jul 10 00:59:09.024313 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Jul 10 00:59:09.024398 systemd[1]: Finished systemd-update-utmp-runlevel.service. Jul 10 00:59:09.024621 systemd[1]: Startup finished in 958ms (kernel) + 6.137s (initrd) + 6.482s (userspace) = 13.578s. Jul 10 00:59:09.057734 login[1373]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) Jul 10 00:59:09.059360 login[1374]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) Jul 10 00:59:09.066947 systemd[1]: Created slice user-500.slice. Jul 10 00:59:09.067802 systemd[1]: Starting user-runtime-dir@500.service... Jul 10 00:59:09.073048 systemd-logind[1255]: New session 1 of user core. Jul 10 00:59:09.075448 systemd-logind[1255]: New session 2 of user core. Jul 10 00:59:09.078311 systemd[1]: Finished user-runtime-dir@500.service. Jul 10 00:59:09.079361 systemd[1]: Starting user@500.service... Jul 10 00:59:09.082832 (systemd)[1380]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Jul 10 00:59:09.136938 systemd[1380]: Queued start job for default target default.target. Jul 10 00:59:09.137494 systemd[1380]: Reached target paths.target. Jul 10 00:59:09.137512 systemd[1380]: Reached target sockets.target. Jul 10 00:59:09.137520 systemd[1380]: Reached target timers.target. Jul 10 00:59:09.137528 systemd[1380]: Reached target basic.target. Jul 10 00:59:09.137586 systemd[1]: Started user@500.service. Jul 10 00:59:09.138446 systemd[1]: Started session-1.scope. Jul 10 00:59:09.138964 systemd[1]: Started session-2.scope. Jul 10 00:59:09.140269 systemd[1380]: Reached target default.target. Jul 10 00:59:09.140445 systemd[1380]: Startup finished in 52ms. Jul 10 00:59:09.814828 kubelet[1377]: E0710 00:59:09.814798 1377 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Jul 10 00:59:09.816228 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Jul 10 00:59:09.816314 systemd[1]: kubelet.service: Failed with result 'exit-code'. Jul 10 00:59:20.066851 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1. Jul 10 00:59:20.066984 systemd[1]: Stopped kubelet.service. Jul 10 00:59:20.067972 systemd[1]: Starting kubelet.service... Jul 10 00:59:20.255589 systemd[1]: Started kubelet.service. Jul 10 00:59:20.300507 kubelet[1409]: E0710 00:59:20.300478 1409 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Jul 10 00:59:20.303308 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Jul 10 00:59:20.303417 systemd[1]: kubelet.service: Failed with result 'exit-code'. Jul 10 00:59:30.554036 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 2. Jul 10 00:59:30.554162 systemd[1]: Stopped kubelet.service. Jul 10 00:59:30.555208 systemd[1]: Starting kubelet.service... Jul 10 00:59:30.875462 systemd[1]: Started kubelet.service. Jul 10 00:59:30.913570 kubelet[1419]: E0710 00:59:30.913529 1419 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Jul 10 00:59:30.914645 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Jul 10 00:59:30.914717 systemd[1]: kubelet.service: Failed with result 'exit-code'. Jul 10 00:59:38.074519 systemd[1]: Created slice system-sshd.slice. Jul 10 00:59:38.075701 systemd[1]: Started sshd@0-139.178.70.103:22-139.178.68.195:34904.service. Jul 10 00:59:38.118045 sshd[1425]: Accepted publickey for core from 139.178.68.195 port 34904 ssh2: RSA SHA256:NVpdRDPpwzjVTzi6orhe1cA9BvcYymCSReGH8myOy/Q Jul 10 00:59:38.118809 sshd[1425]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 10 00:59:38.122027 systemd[1]: Started session-3.scope. Jul 10 00:59:38.122436 systemd-logind[1255]: New session 3 of user core. Jul 10 00:59:38.170825 systemd[1]: Started sshd@1-139.178.70.103:22-139.178.68.195:34918.service. Jul 10 00:59:38.199859 sshd[1430]: Accepted publickey for core from 139.178.68.195 port 34918 ssh2: RSA SHA256:NVpdRDPpwzjVTzi6orhe1cA9BvcYymCSReGH8myOy/Q Jul 10 00:59:38.200938 sshd[1430]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 10 00:59:38.204113 systemd[1]: Started session-4.scope. Jul 10 00:59:38.204440 systemd-logind[1255]: New session 4 of user core. Jul 10 00:59:38.254471 sshd[1430]: pam_unix(sshd:session): session closed for user core Jul 10 00:59:38.256545 systemd[1]: Started sshd@2-139.178.70.103:22-139.178.68.195:34930.service. Jul 10 00:59:38.258156 systemd-logind[1255]: Session 4 logged out. Waiting for processes to exit. Jul 10 00:59:38.258287 systemd[1]: sshd@1-139.178.70.103:22-139.178.68.195:34918.service: Deactivated successfully. Jul 10 00:59:38.258698 systemd[1]: session-4.scope: Deactivated successfully. Jul 10 00:59:38.259727 systemd-logind[1255]: Removed session 4. Jul 10 00:59:38.283865 sshd[1435]: Accepted publickey for core from 139.178.68.195 port 34930 ssh2: RSA SHA256:NVpdRDPpwzjVTzi6orhe1cA9BvcYymCSReGH8myOy/Q Jul 10 00:59:38.285082 sshd[1435]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 10 00:59:38.288719 systemd[1]: Started session-5.scope. Jul 10 00:59:38.289255 systemd-logind[1255]: New session 5 of user core. Jul 10 00:59:38.337468 sshd[1435]: pam_unix(sshd:session): session closed for user core Jul 10 00:59:38.339859 systemd[1]: sshd@2-139.178.70.103:22-139.178.68.195:34930.service: Deactivated successfully. Jul 10 00:59:38.340258 systemd[1]: session-5.scope: Deactivated successfully. Jul 10 00:59:38.340623 systemd-logind[1255]: Session 5 logged out. Waiting for processes to exit. Jul 10 00:59:38.341341 systemd[1]: Started sshd@3-139.178.70.103:22-139.178.68.195:34940.service. Jul 10 00:59:38.341891 systemd-logind[1255]: Removed session 5. Jul 10 00:59:38.368884 sshd[1442]: Accepted publickey for core from 139.178.68.195 port 34940 ssh2: RSA SHA256:NVpdRDPpwzjVTzi6orhe1cA9BvcYymCSReGH8myOy/Q Jul 10 00:59:38.369719 sshd[1442]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 10 00:59:38.372549 systemd-logind[1255]: New session 6 of user core. Jul 10 00:59:38.373048 systemd[1]: Started session-6.scope. Jul 10 00:59:38.422858 sshd[1442]: pam_unix(sshd:session): session closed for user core Jul 10 00:59:38.424905 systemd[1]: sshd@3-139.178.70.103:22-139.178.68.195:34940.service: Deactivated successfully. Jul 10 00:59:38.425232 systemd[1]: session-6.scope: Deactivated successfully. Jul 10 00:59:38.425651 systemd-logind[1255]: Session 6 logged out. Waiting for processes to exit. Jul 10 00:59:38.426233 systemd[1]: Started sshd@4-139.178.70.103:22-139.178.68.195:34944.service. Jul 10 00:59:38.426857 systemd-logind[1255]: Removed session 6. Jul 10 00:59:38.452538 sshd[1448]: Accepted publickey for core from 139.178.68.195 port 34944 ssh2: RSA SHA256:NVpdRDPpwzjVTzi6orhe1cA9BvcYymCSReGH8myOy/Q Jul 10 00:59:38.453443 sshd[1448]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 10 00:59:38.456460 systemd-logind[1255]: New session 7 of user core. Jul 10 00:59:38.457153 systemd[1]: Started session-7.scope. Jul 10 00:59:38.533753 sudo[1451]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Jul 10 00:59:38.533947 sudo[1451]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Jul 10 00:59:38.540725 dbus-daemon[1248]: \xd0m\x8aR\xfbU: received setenforce notice (enforcing=1468972576) Jul 10 00:59:38.540836 sudo[1451]: pam_unix(sudo:session): session closed for user root Jul 10 00:59:38.543459 sshd[1448]: pam_unix(sshd:session): session closed for user core Jul 10 00:59:38.546105 systemd[1]: Started sshd@5-139.178.70.103:22-139.178.68.195:34946.service. Jul 10 00:59:38.546492 systemd[1]: sshd@4-139.178.70.103:22-139.178.68.195:34944.service: Deactivated successfully. Jul 10 00:59:38.547009 systemd[1]: session-7.scope: Deactivated successfully. Jul 10 00:59:38.547715 systemd-logind[1255]: Session 7 logged out. Waiting for processes to exit. Jul 10 00:59:38.548834 systemd-logind[1255]: Removed session 7. Jul 10 00:59:38.575747 sshd[1454]: Accepted publickey for core from 139.178.68.195 port 34946 ssh2: RSA SHA256:NVpdRDPpwzjVTzi6orhe1cA9BvcYymCSReGH8myOy/Q Jul 10 00:59:38.576823 sshd[1454]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 10 00:59:38.579430 systemd-logind[1255]: New session 8 of user core. Jul 10 00:59:38.579831 systemd[1]: Started session-8.scope. Jul 10 00:59:38.630016 sudo[1459]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Jul 10 00:59:38.631191 sudo[1459]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Jul 10 00:59:38.633087 sudo[1459]: pam_unix(sudo:session): session closed for user root Jul 10 00:59:38.636021 sudo[1458]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Jul 10 00:59:38.636154 sudo[1458]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Jul 10 00:59:38.641719 systemd[1]: Stopping audit-rules.service... Jul 10 00:59:38.642000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Jul 10 00:59:38.644559 auditctl[1462]: No rules Jul 10 00:59:38.646031 kernel: kauditd_printk_skb: 42 callbacks suppressed Jul 10 00:59:38.646062 kernel: audit: type=1305 audit(1752109178.642:208): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Jul 10 00:59:38.642000 audit[1462]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7fffec49d760 a2=420 a3=0 items=0 ppid=1 pid=1462 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:59:38.646214 systemd[1]: audit-rules.service: Deactivated successfully. Jul 10 00:59:38.646311 systemd[1]: Stopped audit-rules.service. Jul 10 00:59:38.647318 systemd[1]: Starting audit-rules.service... Jul 10 00:59:38.651422 kernel: audit: type=1300 audit(1752109178.642:208): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7fffec49d760 a2=420 a3=0 items=0 ppid=1 pid=1462 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:59:38.642000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Jul 10 00:59:38.645000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:59:38.656659 kernel: audit: type=1327 audit(1752109178.642:208): proctitle=2F7362696E2F617564697463746C002D44 Jul 10 00:59:38.656689 kernel: audit: type=1131 audit(1752109178.645:209): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:59:38.660921 augenrules[1479]: No rules Jul 10 00:59:38.661382 systemd[1]: Finished audit-rules.service. Jul 10 00:59:38.661000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:59:38.664321 sudo[1458]: pam_unix(sudo:session): session closed for user root Jul 10 00:59:38.664495 kernel: audit: type=1130 audit(1752109178.661:210): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:59:38.663000 audit[1458]: USER_END pid=1458 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 10 00:59:38.667251 systemd[1]: Started sshd@6-139.178.70.103:22-139.178.68.195:34958.service. Jul 10 00:59:38.663000 audit[1458]: CRED_DISP pid=1458 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 10 00:59:38.670300 kernel: audit: type=1106 audit(1752109178.663:211): pid=1458 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 10 00:59:38.670340 kernel: audit: type=1104 audit(1752109178.663:212): pid=1458 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 10 00:59:38.670399 sshd[1454]: pam_unix(sshd:session): session closed for user core Jul 10 00:59:38.666000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-139.178.70.103:22-139.178.68.195:34958 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:59:38.672230 systemd[1]: sshd@5-139.178.70.103:22-139.178.68.195:34946.service: Deactivated successfully. Jul 10 00:59:38.672628 systemd[1]: session-8.scope: Deactivated successfully. Jul 10 00:59:38.671000 audit[1454]: USER_END pid=1454 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 10 00:59:38.678878 kernel: audit: type=1130 audit(1752109178.666:213): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-139.178.70.103:22-139.178.68.195:34958 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:59:38.678903 kernel: audit: type=1106 audit(1752109178.671:214): pid=1454 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 10 00:59:38.678904 systemd-logind[1255]: Session 8 logged out. Waiting for processes to exit. Jul 10 00:59:38.671000 audit[1454]: CRED_DISP pid=1454 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 10 00:59:38.682021 kernel: audit: type=1104 audit(1752109178.671:215): pid=1454 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 10 00:59:38.671000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-139.178.70.103:22-139.178.68.195:34946 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:59:38.682252 systemd-logind[1255]: Removed session 8. Jul 10 00:59:38.698000 audit[1484]: USER_ACCT pid=1484 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 10 00:59:38.698972 sshd[1484]: Accepted publickey for core from 139.178.68.195 port 34958 ssh2: RSA SHA256:NVpdRDPpwzjVTzi6orhe1cA9BvcYymCSReGH8myOy/Q Jul 10 00:59:38.699000 audit[1484]: CRED_ACQ pid=1484 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 10 00:59:38.699000 audit[1484]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe4ddb64e0 a2=3 a3=0 items=0 ppid=1 pid=1484 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:59:38.699000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 10 00:59:38.699915 sshd[1484]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 10 00:59:38.702368 systemd-logind[1255]: New session 9 of user core. Jul 10 00:59:38.702886 systemd[1]: Started session-9.scope. Jul 10 00:59:38.705000 audit[1484]: USER_START pid=1484 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 10 00:59:38.706000 audit[1487]: CRED_ACQ pid=1487 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 10 00:59:38.750000 audit[1488]: USER_ACCT pid=1488 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 10 00:59:38.751440 sudo[1488]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Jul 10 00:59:38.751629 sudo[1488]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Jul 10 00:59:38.751000 audit[1488]: CRED_REFR pid=1488 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 10 00:59:38.752000 audit[1488]: USER_START pid=1488 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 10 00:59:38.758186 systemd[1]: /etc/systemd/system/coreos-metadata.service:11: Ignoring unknown escape sequences: "echo "COREOS_CUSTOM_PRIVATE_IPV4=$(ip addr show ens192 | grep "inet 10." | grep -Po "inet \K[\d.]+") Jul 10 00:59:38.760016 systemd[1]: Starting coreos-metadata.service... Jul 10 00:59:38.815616 systemd[1]: coreos-metadata.service: Deactivated successfully. Jul 10 00:59:38.815743 systemd[1]: Finished coreos-metadata.service. Jul 10 00:59:38.815000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=coreos-metadata comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:59:38.815000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=coreos-metadata comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:59:39.839994 systemd[1]: Stopped kubelet.service. Jul 10 00:59:39.839000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:59:39.839000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:59:39.841405 systemd[1]: Starting kubelet.service... Jul 10 00:59:39.856442 systemd[1]: Reloading. Jul 10 00:59:39.917180 /usr/lib/systemd/system-generators/torcx-generator[1549]: time="2025-07-10T00:59:39Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" Jul 10 00:59:39.917399 /usr/lib/systemd/system-generators/torcx-generator[1549]: time="2025-07-10T00:59:39Z" level=info msg="torcx already run" Jul 10 00:59:39.975162 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Jul 10 00:59:39.975174 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Jul 10 00:59:39.986806 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Jul 10 00:59:40.028000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:40.028000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:40.028000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:40.028000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:40.028000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:40.028000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:40.028000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:40.028000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:40.028000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:40.028000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:40.028000 audit: BPF prog-id=43 op=LOAD Jul 10 00:59:40.028000 audit: BPF prog-id=27 op=UNLOAD Jul 10 00:59:40.028000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:40.028000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:40.028000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:40.028000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:40.028000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:40.028000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:40.028000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:40.028000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:40.028000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:40.028000 audit: BPF prog-id=44 op=LOAD Jul 10 00:59:40.028000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:40.028000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:40.028000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:40.028000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:40.028000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:40.028000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:40.028000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:40.028000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:40.028000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:40.028000 audit: BPF prog-id=45 op=LOAD Jul 10 00:59:40.028000 audit: BPF prog-id=28 op=UNLOAD Jul 10 00:59:40.028000 audit: BPF prog-id=29 op=UNLOAD Jul 10 00:59:40.029000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:40.029000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:40.029000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:40.029000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:40.029000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:40.029000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:40.029000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:40.029000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:40.029000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:40.029000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:40.029000 audit: BPF prog-id=46 op=LOAD Jul 10 00:59:40.029000 audit: BPF prog-id=36 op=UNLOAD Jul 10 00:59:40.030000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:40.030000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:40.030000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:40.030000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:40.030000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:40.030000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:40.030000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:40.030000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:40.030000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:40.030000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:40.030000 audit: BPF prog-id=47 op=LOAD Jul 10 00:59:40.030000 audit: BPF prog-id=37 op=UNLOAD Jul 10 00:59:40.030000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:40.030000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:40.030000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:40.030000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:40.030000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:40.030000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:40.030000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:40.030000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:40.030000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:40.031000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:40.031000 audit: BPF prog-id=48 op=LOAD Jul 10 00:59:40.031000 audit: BPF prog-id=30 op=UNLOAD Jul 10 00:59:40.031000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:40.031000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:40.031000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:40.031000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:40.031000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:40.031000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:40.031000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:40.031000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:40.031000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:40.031000 audit: BPF prog-id=49 op=LOAD Jul 10 00:59:40.031000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:40.031000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:40.031000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:40.031000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:40.031000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:40.031000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:40.031000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:40.031000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:40.031000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:40.031000 audit: BPF prog-id=50 op=LOAD Jul 10 00:59:40.031000 audit: BPF prog-id=31 op=UNLOAD Jul 10 00:59:40.031000 audit: BPF prog-id=32 op=UNLOAD Jul 10 00:59:40.031000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:40.031000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:40.031000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:40.031000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:40.031000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:40.031000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:40.031000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:40.031000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:40.031000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:40.031000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:40.031000 audit: BPF prog-id=51 op=LOAD Jul 10 00:59:40.031000 audit: BPF prog-id=41 op=UNLOAD Jul 10 00:59:40.032000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:40.032000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:40.032000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:40.032000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:40.032000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:40.032000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:40.032000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:40.032000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:40.032000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:40.032000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:40.032000 audit: BPF prog-id=52 op=LOAD Jul 10 00:59:40.032000 audit: BPF prog-id=38 op=UNLOAD Jul 10 00:59:40.032000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:40.032000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:40.032000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:40.032000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:40.032000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:40.032000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:40.032000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:40.032000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:40.032000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:40.032000 audit: BPF prog-id=53 op=LOAD Jul 10 00:59:40.032000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:40.032000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:40.032000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:40.032000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:40.032000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:40.032000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:40.032000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:40.032000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:40.032000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:40.032000 audit: BPF prog-id=54 op=LOAD Jul 10 00:59:40.032000 audit: BPF prog-id=39 op=UNLOAD Jul 10 00:59:40.032000 audit: BPF prog-id=40 op=UNLOAD Jul 10 00:59:40.033000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:40.033000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:40.033000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:40.033000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:40.033000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:40.033000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:40.033000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:40.033000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:40.033000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:40.033000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:40.033000 audit: BPF prog-id=55 op=LOAD Jul 10 00:59:40.033000 audit: BPF prog-id=33 op=UNLOAD Jul 10 00:59:40.033000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:40.033000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:40.033000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:40.033000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:40.033000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:40.033000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:40.033000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:40.033000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:40.033000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:40.033000 audit: BPF prog-id=56 op=LOAD Jul 10 00:59:40.033000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:40.033000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:40.033000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:40.033000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:40.033000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:40.033000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:40.033000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:40.033000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:40.033000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:40.033000 audit: BPF prog-id=57 op=LOAD Jul 10 00:59:40.033000 audit: BPF prog-id=34 op=UNLOAD Jul 10 00:59:40.033000 audit: BPF prog-id=35 op=UNLOAD Jul 10 00:59:40.045000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:59:40.045924 systemd[1]: Started kubelet.service. Jul 10 00:59:40.049575 systemd[1]: Stopping kubelet.service... Jul 10 00:59:40.050019 systemd[1]: kubelet.service: Deactivated successfully. Jul 10 00:59:40.050141 systemd[1]: Stopped kubelet.service. Jul 10 00:59:40.049000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:59:40.051459 systemd[1]: Starting kubelet.service... Jul 10 00:59:40.375731 systemd[1]: Started kubelet.service. Jul 10 00:59:40.375000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:59:40.430517 kubelet[1620]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Jul 10 00:59:40.430517 kubelet[1620]: Flag --pod-infra-container-image has been deprecated, will be removed in 1.35. Image garbage collector will get sandbox image information from CRI. Jul 10 00:59:40.430517 kubelet[1620]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Jul 10 00:59:40.430764 kubelet[1620]: I0710 00:59:40.430551 1620 server.go:215] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Jul 10 00:59:40.991497 kubelet[1620]: I0710 00:59:40.991474 1620 server.go:520] "Kubelet version" kubeletVersion="v1.32.4" Jul 10 00:59:40.991497 kubelet[1620]: I0710 00:59:40.991491 1620 server.go:522] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Jul 10 00:59:40.991669 kubelet[1620]: I0710 00:59:40.991657 1620 server.go:954] "Client rotation is on, will bootstrap in background" Jul 10 00:59:41.035050 kubelet[1620]: I0710 00:59:41.034508 1620 dynamic_cafile_content.go:161] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Jul 10 00:59:41.044296 kubelet[1620]: E0710 00:59:41.044279 1620 log.go:32] "RuntimeConfig from runtime service failed" err="rpc error: code = Unimplemented desc = unknown method RuntimeConfig for service runtime.v1.RuntimeService" Jul 10 00:59:41.044446 kubelet[1620]: I0710 00:59:41.044439 1620 server.go:1421] "CRI implementation should be updated to support RuntimeConfig when KubeletCgroupDriverFromCRI feature gate has been enabled. Falling back to using cgroupDriver from kubelet config." Jul 10 00:59:41.046516 kubelet[1620]: I0710 00:59:41.046506 1620 server.go:772] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Jul 10 00:59:41.047316 kubelet[1620]: I0710 00:59:41.047298 1620 container_manager_linux.go:268] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Jul 10 00:59:41.047470 kubelet[1620]: I0710 00:59:41.047364 1620 container_manager_linux.go:273] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"10.67.124.135","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null,"CgroupVersion":2} Jul 10 00:59:41.047571 kubelet[1620]: I0710 00:59:41.047562 1620 topology_manager.go:138] "Creating topology manager with none policy" Jul 10 00:59:41.047618 kubelet[1620]: I0710 00:59:41.047611 1620 container_manager_linux.go:304] "Creating device plugin manager" Jul 10 00:59:41.047722 kubelet[1620]: I0710 00:59:41.047715 1620 state_mem.go:36] "Initialized new in-memory state store" Jul 10 00:59:41.051888 kubelet[1620]: I0710 00:59:41.051877 1620 kubelet.go:446] "Attempting to sync node with API server" Jul 10 00:59:41.051997 kubelet[1620]: I0710 00:59:41.051956 1620 kubelet.go:341] "Adding static pod path" path="/etc/kubernetes/manifests" Jul 10 00:59:41.052067 kubelet[1620]: I0710 00:59:41.052058 1620 kubelet.go:352] "Adding apiserver pod source" Jul 10 00:59:41.052134 kubelet[1620]: I0710 00:59:41.052125 1620 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Jul 10 00:59:41.060368 kubelet[1620]: E0710 00:59:41.060355 1620 file.go:98] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 00:59:41.060463 kubelet[1620]: E0710 00:59:41.060453 1620 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 00:59:41.063169 kubelet[1620]: I0710 00:59:41.063154 1620 kuberuntime_manager.go:269] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Jul 10 00:59:41.063618 kubelet[1620]: I0710 00:59:41.063607 1620 kubelet.go:890] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" Jul 10 00:59:41.063710 kubelet[1620]: W0710 00:59:41.063702 1620 probe.go:272] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Jul 10 00:59:41.065539 kubelet[1620]: I0710 00:59:41.065526 1620 watchdog_linux.go:99] "Systemd watchdog is not enabled" Jul 10 00:59:41.065642 kubelet[1620]: I0710 00:59:41.065633 1620 server.go:1287] "Started kubelet" Jul 10 00:59:41.071000 audit[1620]: AVC avc: denied { mac_admin } for pid=1620 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:41.071000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Jul 10 00:59:41.071000 audit[1620]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000a5d770 a1=c000931578 a2=c000a5d740 a3=25 items=0 ppid=1 pid=1620 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:59:41.071000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Jul 10 00:59:41.071000 audit[1620]: AVC avc: denied { mac_admin } for pid=1620 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:41.071000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Jul 10 00:59:41.071000 audit[1620]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c00091bb80 a1=c000931590 a2=c000a5d800 a3=25 items=0 ppid=1 pid=1620 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:59:41.071000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Jul 10 00:59:41.073350 kubelet[1620]: I0710 00:59:41.073063 1620 kubelet.go:1507] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/plugins_registry: invalid argument" Jul 10 00:59:41.073350 kubelet[1620]: I0710 00:59:41.073087 1620 kubelet.go:1511] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/plugins: invalid argument" Jul 10 00:59:41.073350 kubelet[1620]: I0710 00:59:41.073125 1620 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Jul 10 00:59:41.075332 kubelet[1620]: I0710 00:59:41.075317 1620 desired_state_of_world_populator.go:150] "Desired state populator starts to run" Jul 10 00:59:41.075531 kubelet[1620]: E0710 00:59:41.075357 1620 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"10.67.124.135\" not found" Jul 10 00:59:41.076377 kubelet[1620]: I0710 00:59:41.076362 1620 factory.go:221] Registration of the systemd container factory successfully Jul 10 00:59:41.076736 kubelet[1620]: I0710 00:59:41.076642 1620 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory Jul 10 00:59:41.077648 kubelet[1620]: I0710 00:59:41.077636 1620 factory.go:221] Registration of the containerd container factory successfully Jul 10 00:59:41.079757 kubelet[1620]: I0710 00:59:41.079737 1620 server.go:169] "Starting to listen" address="0.0.0.0" port=10250 Jul 10 00:59:41.081592 kubelet[1620]: I0710 00:59:41.081578 1620 server.go:479] "Adding debug handlers to kubelet server" Jul 10 00:59:41.083396 kubelet[1620]: I0710 00:59:41.083381 1620 dynamic_serving_content.go:135] "Starting controller" name="kubelet-server-cert-files::/var/lib/kubelet/pki/kubelet.crt::/var/lib/kubelet/pki/kubelet.key" Jul 10 00:59:41.083490 kubelet[1620]: I0710 00:59:41.075311 1620 volume_manager.go:297] "Starting Kubelet Volume Manager" Jul 10 00:59:41.083574 kubelet[1620]: E0710 00:59:41.083405 1620 kubelet.go:1555] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Jul 10 00:59:41.083746 kubelet[1620]: I0710 00:59:41.083739 1620 reconciler.go:26] "Reconciler: start to sync state" Jul 10 00:59:41.085545 kubelet[1620]: I0710 00:59:41.085514 1620 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 Jul 10 00:59:41.085709 kubelet[1620]: I0710 00:59:41.085702 1620 server.go:243] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Jul 10 00:59:41.101709 kubelet[1620]: W0710 00:59:41.101690 1620 reflector.go:569] k8s.io/client-go/informers/factory.go:160: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User "system:anonymous" cannot list resource "csidrivers" in API group "storage.k8s.io" at the cluster scope Jul 10 00:59:41.103634 kubelet[1620]: E0710 00:59:41.103621 1620 reflector.go:166] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User \"system:anonymous\" cannot list resource \"csidrivers\" in API group \"storage.k8s.io\" at the cluster scope" logger="UnhandledError" Jul 10 00:59:41.103691 kubelet[1620]: E0710 00:59:41.103543 1620 controller.go:145] "Failed to ensure lease exists, will retry" err="leases.coordination.k8s.io \"10.67.124.135\" is forbidden: User \"system:anonymous\" cannot get resource \"leases\" in API group \"coordination.k8s.io\" in the namespace \"kube-node-lease\"" interval="200ms" Jul 10 00:59:41.103733 kubelet[1620]: E0710 00:59:41.101936 1620 event.go:359] "Server rejected event (will not retry!)" err="events is forbidden: User \"system:anonymous\" cannot create resource \"events\" in API group \"\" in the namespace \"default\"" event="&Event{ObjectMeta:{10.67.124.135.1850be04611db682 default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:10.67.124.135,UID:10.67.124.135,APIVersion:,ResourceVersion:,FieldPath:,},Reason:Starting,Message:Starting kubelet.,Source:EventSource{Component:kubelet,Host:10.67.124.135,},FirstTimestamp:2025-07-10 00:59:41.065606786 +0000 UTC m=+0.685350489,LastTimestamp:2025-07-10 00:59:41.065606786 +0000 UTC m=+0.685350489,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:10.67.124.135,}" Jul 10 00:59:41.103927 kubelet[1620]: W0710 00:59:41.101884 1620 reflector.go:569] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope Jul 10 00:59:41.104007 kubelet[1620]: E0710 00:59:41.103996 1620 reflector.go:166] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Service: failed to list *v1.Service: services is forbidden: User \"system:anonymous\" cannot list resource \"services\" in API group \"\" at the cluster scope" logger="UnhandledError" Jul 10 00:59:41.104047 kubelet[1620]: W0710 00:59:41.101918 1620 reflector.go:569] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Node: nodes "10.67.124.135" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope Jul 10 00:59:41.104096 kubelet[1620]: E0710 00:59:41.104087 1620 reflector.go:166] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Node: failed to list *v1.Node: nodes \"10.67.124.135\" is forbidden: User \"system:anonymous\" cannot list resource \"nodes\" in API group \"\" at the cluster scope" logger="UnhandledError" Jul 10 00:59:41.106649 kubelet[1620]: I0710 00:59:41.106641 1620 cpu_manager.go:221] "Starting CPU manager" policy="none" Jul 10 00:59:41.106714 kubelet[1620]: I0710 00:59:41.106707 1620 cpu_manager.go:222] "Reconciling" reconcilePeriod="10s" Jul 10 00:59:41.106761 kubelet[1620]: I0710 00:59:41.106754 1620 state_mem.go:36] "Initialized new in-memory state store" Jul 10 00:59:41.107654 kubelet[1620]: E0710 00:59:41.107599 1620 event.go:359] "Server rejected event (will not retry!)" err="events is forbidden: User \"system:anonymous\" cannot create resource \"events\" in API group \"\" in the namespace \"default\"" event="&Event{ObjectMeta:{10.67.124.135.1850be04622d3097 default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:10.67.124.135,UID:10.67.124.135,APIVersion:,ResourceVersion:,FieldPath:,},Reason:InvalidDiskCapacity,Message:invalid capacity 0 on image filesystem,Source:EventSource{Component:kubelet,Host:10.67.124.135,},FirstTimestamp:2025-07-10 00:59:41.083398295 +0000 UTC m=+0.703141991,LastTimestamp:2025-07-10 00:59:41.083398295 +0000 UTC m=+0.703141991,Count:1,Type:Warning,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:10.67.124.135,}" Jul 10 00:59:41.108539 kubelet[1620]: I0710 00:59:41.108524 1620 policy_none.go:49] "None policy: Start" Jul 10 00:59:41.108637 kubelet[1620]: I0710 00:59:41.108629 1620 memory_manager.go:186] "Starting memorymanager" policy="None" Jul 10 00:59:41.108694 kubelet[1620]: I0710 00:59:41.108682 1620 state_mem.go:35] "Initializing new in-memory state store" Jul 10 00:59:41.109000 audit[1635]: NETFILTER_CFG table=mangle:2 family=2 entries=2 op=nft_register_chain pid=1635 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 10 00:59:41.109000 audit[1635]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffd32cf4e90 a2=0 a3=7ffd32cf4e7c items=0 ppid=1620 pid=1635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:59:41.109000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Jul 10 00:59:41.110000 audit[1640]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=1640 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 10 00:59:41.110000 audit[1640]: SYSCALL arch=c000003e syscall=46 success=yes exit=132 a0=3 a1=7ffe34382eb0 a2=0 a3=7ffe34382e9c items=0 ppid=1620 pid=1640 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:59:41.110000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Jul 10 00:59:41.113144 systemd[1]: Created slice kubepods.slice. Jul 10 00:59:41.115835 systemd[1]: Created slice kubepods-burstable.slice. Jul 10 00:59:41.117794 systemd[1]: Created slice kubepods-besteffort.slice. Jul 10 00:59:41.118266 kubelet[1620]: E0710 00:59:41.117986 1620 event.go:359] "Server rejected event (will not retry!)" err="events is forbidden: User \"system:anonymous\" cannot create resource \"events\" in API group \"\" in the namespace \"default\"" event="&Event{ObjectMeta:{10.67.124.135.1850be046384b898 default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:10.67.124.135,UID:10.67.124.135,APIVersion:,ResourceVersion:,FieldPath:,},Reason:NodeHasSufficientMemory,Message:Node 10.67.124.135 status is now: NodeHasSufficientMemory,Source:EventSource{Component:kubelet,Host:10.67.124.135,},FirstTimestamp:2025-07-10 00:59:41.10591196 +0000 UTC m=+0.725655655,LastTimestamp:2025-07-10 00:59:41.10591196 +0000 UTC m=+0.725655655,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:10.67.124.135,}" Jul 10 00:59:41.124053 kubelet[1620]: I0710 00:59:41.124039 1620 manager.go:519] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Jul 10 00:59:41.122000 audit[1620]: AVC avc: denied { mac_admin } for pid=1620 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:41.122000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Jul 10 00:59:41.122000 audit[1620]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000ab0180 a1=c000897b60 a2=c000ab0150 a3=25 items=0 ppid=1 pid=1620 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:59:41.122000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Jul 10 00:59:41.125605 kubelet[1620]: I0710 00:59:41.125590 1620 server.go:94] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/device-plugins/: invalid argument" Jul 10 00:59:41.126036 kubelet[1620]: I0710 00:59:41.126027 1620 eviction_manager.go:189] "Eviction manager: starting control loop" Jul 10 00:59:41.126098 kubelet[1620]: I0710 00:59:41.126076 1620 container_log_manager.go:189] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" Jul 10 00:59:41.126422 kubelet[1620]: I0710 00:59:41.126271 1620 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Jul 10 00:59:41.127491 kubelet[1620]: E0710 00:59:41.127483 1620 eviction_manager.go:267] "eviction manager: failed to check if we have separate container filesystem. Ignoring." err="no imagefs label for configured runtime" Jul 10 00:59:41.127564 kubelet[1620]: E0710 00:59:41.127556 1620 eviction_manager.go:292] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"10.67.124.135\" not found" Jul 10 00:59:41.112000 audit[1642]: NETFILTER_CFG table=filter:4 family=2 entries=2 op=nft_register_chain pid=1642 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 10 00:59:41.112000 audit[1642]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7fff42435b90 a2=0 a3=7fff42435b7c items=0 ppid=1620 pid=1642 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:59:41.112000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Jul 10 00:59:41.128000 audit[1647]: NETFILTER_CFG table=filter:5 family=2 entries=2 op=nft_register_chain pid=1647 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 10 00:59:41.128000 audit[1647]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffe8c981130 a2=0 a3=7ffe8c98111c items=0 ppid=1620 pid=1647 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:59:41.128000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Jul 10 00:59:41.130668 kubelet[1620]: E0710 00:59:41.130579 1620 event.go:359] "Server rejected event (will not retry!)" err="events is forbidden: User \"system:anonymous\" cannot create resource \"events\" in API group \"\" in the namespace \"default\"" event="&Event{ObjectMeta:{10.67.124.135.1850be046384c292 default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:10.67.124.135,UID:10.67.124.135,APIVersion:,ResourceVersion:,FieldPath:,},Reason:NodeHasNoDiskPressure,Message:Node 10.67.124.135 status is now: NodeHasNoDiskPressure,Source:EventSource{Component:kubelet,Host:10.67.124.135,},FirstTimestamp:2025-07-10 00:59:41.105914514 +0000 UTC m=+0.725658204,LastTimestamp:2025-07-10 00:59:41.105914514 +0000 UTC m=+0.725658204,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:10.67.124.135,}" Jul 10 00:59:41.133877 kubelet[1620]: E0710 00:59:41.133789 1620 event.go:359] "Server rejected event (will not retry!)" err="events is forbidden: User \"system:anonymous\" cannot create resource \"events\" in API group \"\" in the namespace \"default\"" event="&Event{ObjectMeta:{10.67.124.135.1850be046384f9ee default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:10.67.124.135,UID:10.67.124.135,APIVersion:,ResourceVersion:,FieldPath:,},Reason:NodeHasSufficientPID,Message:Node 10.67.124.135 status is now: NodeHasSufficientPID,Source:EventSource{Component:kubelet,Host:10.67.124.135,},FirstTimestamp:2025-07-10 00:59:41.105928686 +0000 UTC m=+0.725672376,LastTimestamp:2025-07-10 00:59:41.105928686 +0000 UTC m=+0.725672376,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:10.67.124.135,}" Jul 10 00:59:41.136584 kubelet[1620]: E0710 00:59:41.136527 1620 event.go:359] "Server rejected event (will not retry!)" err="events is forbidden: User \"system:anonymous\" cannot create resource \"events\" in API group \"\" in the namespace \"default\"" event="&Event{ObjectMeta:{10.67.124.135.1850be0464a9fdc1 default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:10.67.124.135,UID:10.67.124.135,APIVersion:,ResourceVersion:,FieldPath:,},Reason:NodeAllocatableEnforced,Message:Updated Node Allocatable limit across pods,Source:EventSource{Component:kubelet,Host:10.67.124.135,},FirstTimestamp:2025-07-10 00:59:41.125131713 +0000 UTC m=+0.744875407,LastTimestamp:2025-07-10 00:59:41.125131713 +0000 UTC m=+0.744875407,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:10.67.124.135,}" Jul 10 00:59:41.170000 audit[1652]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=1652 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 10 00:59:41.170000 audit[1652]: SYSCALL arch=c000003e syscall=46 success=yes exit=924 a0=3 a1=7fff603fdd60 a2=0 a3=7fff603fdd4c items=0 ppid=1620 pid=1652 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:59:41.170000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Jul 10 00:59:41.171767 kubelet[1620]: I0710 00:59:41.171693 1620 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Jul 10 00:59:41.172304 kubelet[1620]: I0710 00:59:41.172292 1620 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Jul 10 00:59:41.172304 kubelet[1620]: I0710 00:59:41.172305 1620 status_manager.go:227] "Starting to sync pod status with apiserver" Jul 10 00:59:41.172365 kubelet[1620]: I0710 00:59:41.172318 1620 watchdog_linux.go:127] "Systemd watchdog is not enabled or the interval is invalid, so health checking will not be started." Jul 10 00:59:41.172365 kubelet[1620]: I0710 00:59:41.172323 1620 kubelet.go:2382] "Starting kubelet main sync loop" Jul 10 00:59:41.172403 kubelet[1620]: E0710 00:59:41.172385 1620 kubelet.go:2406] "Skipping pod synchronization" err="PLEG is not healthy: pleg has yet to be successful" Jul 10 00:59:41.170000 audit[1653]: NETFILTER_CFG table=mangle:7 family=10 entries=2 op=nft_register_chain pid=1653 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 10 00:59:41.170000 audit[1653]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffe78eeeb30 a2=0 a3=7ffe78eeeb1c items=0 ppid=1620 pid=1653 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:59:41.170000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Jul 10 00:59:41.171000 audit[1654]: NETFILTER_CFG table=mangle:8 family=2 entries=1 op=nft_register_chain pid=1654 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 10 00:59:41.171000 audit[1654]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffff3040d30 a2=0 a3=7ffff3040d1c items=0 ppid=1620 pid=1654 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:59:41.171000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Jul 10 00:59:41.172000 audit[1655]: NETFILTER_CFG table=mangle:9 family=10 entries=1 op=nft_register_chain pid=1655 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 10 00:59:41.172000 audit[1655]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe2418ecb0 a2=0 a3=7ffe2418ec9c items=0 ppid=1620 pid=1655 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:59:41.172000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Jul 10 00:59:41.172000 audit[1656]: NETFILTER_CFG table=nat:10 family=10 entries=2 op=nft_register_chain pid=1656 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 10 00:59:41.172000 audit[1656]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7ffcd04215e0 a2=0 a3=7ffcd04215cc items=0 ppid=1620 pid=1656 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:59:41.172000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Jul 10 00:59:41.172000 audit[1657]: NETFILTER_CFG table=nat:11 family=2 entries=2 op=nft_register_chain pid=1657 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 10 00:59:41.172000 audit[1657]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7ffc0f512ab0 a2=0 a3=7ffc0f512a9c items=0 ppid=1620 pid=1657 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:59:41.172000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Jul 10 00:59:41.173000 audit[1658]: NETFILTER_CFG table=filter:12 family=10 entries=2 op=nft_register_chain pid=1658 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 10 00:59:41.173000 audit[1658]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7fff68ea4260 a2=0 a3=7fff68ea424c items=0 ppid=1620 pid=1658 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:59:41.173000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Jul 10 00:59:41.173000 audit[1659]: NETFILTER_CFG table=filter:13 family=2 entries=1 op=nft_register_chain pid=1659 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 10 00:59:41.173000 audit[1659]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd1fabbd50 a2=0 a3=10e3 items=0 ppid=1620 pid=1659 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:59:41.173000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Jul 10 00:59:41.175601 kubelet[1620]: W0710 00:59:41.175580 1620 reflector.go:569] k8s.io/client-go/informers/factory.go:160: failed to list *v1.RuntimeClass: runtimeclasses.node.k8s.io is forbidden: User "system:anonymous" cannot list resource "runtimeclasses" in API group "node.k8s.io" at the cluster scope Jul 10 00:59:41.175638 kubelet[1620]: E0710 00:59:41.175604 1620 reflector.go:166] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: runtimeclasses.node.k8s.io is forbidden: User \"system:anonymous\" cannot list resource \"runtimeclasses\" in API group \"node.k8s.io\" at the cluster scope" logger="UnhandledError" Jul 10 00:59:41.227588 kubelet[1620]: I0710 00:59:41.227568 1620 kubelet_node_status.go:75] "Attempting to register node" node="10.67.124.135" Jul 10 00:59:41.234777 kubelet[1620]: E0710 00:59:41.234732 1620 event.go:359] "Server rejected event (will not retry!)" err="events \"10.67.124.135.1850be046384b898\" is forbidden: User \"system:anonymous\" cannot patch resource \"events\" in API group \"\" in the namespace \"default\"" event="&Event{ObjectMeta:{10.67.124.135.1850be046384b898 default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:10.67.124.135,UID:10.67.124.135,APIVersion:,ResourceVersion:,FieldPath:,},Reason:NodeHasSufficientMemory,Message:Node 10.67.124.135 status is now: NodeHasSufficientMemory,Source:EventSource{Component:kubelet,Host:10.67.124.135,},FirstTimestamp:2025-07-10 00:59:41.10591196 +0000 UTC m=+0.725655655,LastTimestamp:2025-07-10 00:59:41.227532028 +0000 UTC m=+0.847275724,Count:2,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:10.67.124.135,}" Jul 10 00:59:41.237964 kubelet[1620]: E0710 00:59:41.237927 1620 kubelet_node_status.go:113] "Unable to register node with API server, error getting existing node" err="nodes \"10.67.124.135\" is forbidden: User \"system:anonymous\" cannot get resource \"nodes\" in API group \"\" at the cluster scope" node="10.67.124.135" Jul 10 00:59:41.238034 kubelet[1620]: E0710 00:59:41.237923 1620 event.go:359] "Server rejected event (will not retry!)" err="events \"10.67.124.135.1850be046384c292\" is forbidden: User \"system:anonymous\" cannot patch resource \"events\" in API group \"\" in the namespace \"default\"" event="&Event{ObjectMeta:{10.67.124.135.1850be046384c292 default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:10.67.124.135,UID:10.67.124.135,APIVersion:,ResourceVersion:,FieldPath:,},Reason:NodeHasNoDiskPressure,Message:Node 10.67.124.135 status is now: NodeHasNoDiskPressure,Source:EventSource{Component:kubelet,Host:10.67.124.135,},FirstTimestamp:2025-07-10 00:59:41.105914514 +0000 UTC m=+0.725658204,LastTimestamp:2025-07-10 00:59:41.227539586 +0000 UTC m=+0.847283281,Count:2,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:10.67.124.135,}" Jul 10 00:59:41.239389 kubelet[1620]: E0710 00:59:41.239357 1620 event.go:359] "Server rejected event (will not retry!)" err="events \"10.67.124.135.1850be046384f9ee\" is forbidden: User \"system:anonymous\" cannot patch resource \"events\" in API group \"\" in the namespace \"default\"" event="&Event{ObjectMeta:{10.67.124.135.1850be046384f9ee default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:10.67.124.135,UID:10.67.124.135,APIVersion:,ResourceVersion:,FieldPath:,},Reason:NodeHasSufficientPID,Message:Node 10.67.124.135 status is now: NodeHasSufficientPID,Source:EventSource{Component:kubelet,Host:10.67.124.135,},FirstTimestamp:2025-07-10 00:59:41.105928686 +0000 UTC m=+0.725672376,LastTimestamp:2025-07-10 00:59:41.227541138 +0000 UTC m=+0.847284834,Count:2,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:10.67.124.135,}" Jul 10 00:59:41.304651 kubelet[1620]: E0710 00:59:41.304587 1620 controller.go:145] "Failed to ensure lease exists, will retry" err="leases.coordination.k8s.io \"10.67.124.135\" is forbidden: User \"system:anonymous\" cannot get resource \"leases\" in API group \"coordination.k8s.io\" in the namespace \"kube-node-lease\"" interval="400ms" Jul 10 00:59:41.439299 kubelet[1620]: I0710 00:59:41.439282 1620 kubelet_node_status.go:75] "Attempting to register node" node="10.67.124.135" Jul 10 00:59:41.481566 kubelet[1620]: I0710 00:59:41.481542 1620 kubelet_node_status.go:78] "Successfully registered node" node="10.67.124.135" Jul 10 00:59:41.481566 kubelet[1620]: E0710 00:59:41.481564 1620 kubelet_node_status.go:548] "Error updating node status, will retry" err="error getting node \"10.67.124.135\": node \"10.67.124.135\" not found" Jul 10 00:59:41.517588 kubelet[1620]: E0710 00:59:41.517558 1620 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"10.67.124.135\" not found" Jul 10 00:59:41.618437 kubelet[1620]: E0710 00:59:41.618334 1620 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"10.67.124.135\" not found" Jul 10 00:59:41.719398 kubelet[1620]: E0710 00:59:41.719377 1620 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"10.67.124.135\" not found" Jul 10 00:59:41.820343 kubelet[1620]: E0710 00:59:41.820315 1620 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"10.67.124.135\" not found" Jul 10 00:59:41.921117 kubelet[1620]: E0710 00:59:41.921044 1620 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"10.67.124.135\" not found" Jul 10 00:59:41.928000 audit[1488]: USER_END pid=1488 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 10 00:59:41.928000 audit[1488]: CRED_DISP pid=1488 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 10 00:59:41.930125 sudo[1488]: pam_unix(sudo:session): session closed for user root Jul 10 00:59:41.931427 sshd[1484]: pam_unix(sshd:session): session closed for user core Jul 10 00:59:41.930000 audit[1484]: USER_END pid=1484 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 10 00:59:41.930000 audit[1484]: CRED_DISP pid=1484 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 10 00:59:41.933184 systemd[1]: sshd@6-139.178.70.103:22-139.178.68.195:34958.service: Deactivated successfully. Jul 10 00:59:41.931000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-139.178.70.103:22-139.178.68.195:34958 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:59:41.933672 systemd[1]: session-9.scope: Deactivated successfully. Jul 10 00:59:41.934189 systemd-logind[1255]: Session 9 logged out. Waiting for processes to exit. Jul 10 00:59:41.934783 systemd-logind[1255]: Removed session 9. Jul 10 00:59:41.996629 kubelet[1620]: I0710 00:59:41.996603 1620 transport.go:147] "Certificate rotation detected, shutting down client connections to start using new credentials" Jul 10 00:59:42.021789 kubelet[1620]: E0710 00:59:42.021753 1620 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"10.67.124.135\" not found" Jul 10 00:59:42.060763 kubelet[1620]: E0710 00:59:42.060718 1620 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 00:59:42.122818 kubelet[1620]: E0710 00:59:42.122793 1620 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"10.67.124.135\" not found" Jul 10 00:59:42.223854 kubelet[1620]: E0710 00:59:42.223497 1620 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"10.67.124.135\" not found" Jul 10 00:59:42.324302 kubelet[1620]: I0710 00:59:42.324273 1620 kuberuntime_manager.go:1702] "Updating runtime config through cri with podcidr" CIDR="192.168.1.0/24" Jul 10 00:59:42.324499 env[1286]: time="2025-07-10T00:59:42.324472399Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Jul 10 00:59:42.324746 kubelet[1620]: I0710 00:59:42.324736 1620 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.1.0/24" Jul 10 00:59:43.061405 kubelet[1620]: E0710 00:59:43.061352 1620 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 00:59:43.061693 kubelet[1620]: I0710 00:59:43.061431 1620 apiserver.go:52] "Watching apiserver" Jul 10 00:59:43.082080 kubelet[1620]: E0710 00:59:43.082053 1620 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-bfm74" podUID="f8539811-5553-42c4-b972-5bfd95d2de66" Jul 10 00:59:43.085390 systemd[1]: Created slice kubepods-besteffort-podcbe2b5f7_e2e6_4ee8_bec6_61dcbbe5b058.slice. Jul 10 00:59:43.095191 systemd[1]: Created slice kubepods-besteffort-pode3f796c3_b34c_45cb_8e71_c73a5126bc75.slice. Jul 10 00:59:43.175882 kubelet[1620]: I0710 00:59:43.175865 1620 desired_state_of_world_populator.go:158] "Finished populating initial desired state of world" Jul 10 00:59:43.194129 kubelet[1620]: I0710 00:59:43.194099 1620 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-wgt96\" (UniqueName: \"kubernetes.io/projected/cbe2b5f7-e2e6-4ee8-bec6-61dcbbe5b058-kube-api-access-wgt96\") pod \"kube-proxy-cjdk9\" (UID: \"cbe2b5f7-e2e6-4ee8-bec6-61dcbbe5b058\") " pod="kube-system/kube-proxy-cjdk9" Jul 10 00:59:43.194129 kubelet[1620]: I0710 00:59:43.194131 1620 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/e3f796c3-b34c-45cb-8e71-c73a5126bc75-node-certs\") pod \"calico-node-pclwm\" (UID: \"e3f796c3-b34c-45cb-8e71-c73a5126bc75\") " pod="calico-system/calico-node-pclwm" Jul 10 00:59:43.194242 kubelet[1620]: I0710 00:59:43.194146 1620 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/e3f796c3-b34c-45cb-8e71-c73a5126bc75-tigera-ca-bundle\") pod \"calico-node-pclwm\" (UID: \"e3f796c3-b34c-45cb-8e71-c73a5126bc75\") " pod="calico-system/calico-node-pclwm" Jul 10 00:59:43.194242 kubelet[1620]: I0710 00:59:43.194155 1620 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/e3f796c3-b34c-45cb-8e71-c73a5126bc75-var-lib-calico\") pod \"calico-node-pclwm\" (UID: \"e3f796c3-b34c-45cb-8e71-c73a5126bc75\") " pod="calico-system/calico-node-pclwm" Jul 10 00:59:43.194242 kubelet[1620]: I0710 00:59:43.194165 1620 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/e3f796c3-b34c-45cb-8e71-c73a5126bc75-var-run-calico\") pod \"calico-node-pclwm\" (UID: \"e3f796c3-b34c-45cb-8e71-c73a5126bc75\") " pod="calico-system/calico-node-pclwm" Jul 10 00:59:43.194242 kubelet[1620]: I0710 00:59:43.194174 1620 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/f8539811-5553-42c4-b972-5bfd95d2de66-kubelet-dir\") pod \"csi-node-driver-bfm74\" (UID: \"f8539811-5553-42c4-b972-5bfd95d2de66\") " pod="calico-system/csi-node-driver-bfm74" Jul 10 00:59:43.194242 kubelet[1620]: I0710 00:59:43.194182 1620 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/f8539811-5553-42c4-b972-5bfd95d2de66-varrun\") pod \"csi-node-driver-bfm74\" (UID: \"f8539811-5553-42c4-b972-5bfd95d2de66\") " pod="calico-system/csi-node-driver-bfm74" Jul 10 00:59:43.194341 kubelet[1620]: I0710 00:59:43.194191 1620 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/f8539811-5553-42c4-b972-5bfd95d2de66-socket-dir\") pod \"csi-node-driver-bfm74\" (UID: \"f8539811-5553-42c4-b972-5bfd95d2de66\") " pod="calico-system/csi-node-driver-bfm74" Jul 10 00:59:43.194341 kubelet[1620]: I0710 00:59:43.194200 1620 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/cbe2b5f7-e2e6-4ee8-bec6-61dcbbe5b058-kube-proxy\") pod \"kube-proxy-cjdk9\" (UID: \"cbe2b5f7-e2e6-4ee8-bec6-61dcbbe5b058\") " pod="kube-system/kube-proxy-cjdk9" Jul 10 00:59:43.194341 kubelet[1620]: I0710 00:59:43.194210 1620 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/e3f796c3-b34c-45cb-8e71-c73a5126bc75-cni-bin-dir\") pod \"calico-node-pclwm\" (UID: \"e3f796c3-b34c-45cb-8e71-c73a5126bc75\") " pod="calico-system/calico-node-pclwm" Jul 10 00:59:43.194341 kubelet[1620]: I0710 00:59:43.194219 1620 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/e3f796c3-b34c-45cb-8e71-c73a5126bc75-cni-log-dir\") pod \"calico-node-pclwm\" (UID: \"e3f796c3-b34c-45cb-8e71-c73a5126bc75\") " pod="calico-system/calico-node-pclwm" Jul 10 00:59:43.194341 kubelet[1620]: I0710 00:59:43.194227 1620 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/e3f796c3-b34c-45cb-8e71-c73a5126bc75-lib-modules\") pod \"calico-node-pclwm\" (UID: \"e3f796c3-b34c-45cb-8e71-c73a5126bc75\") " pod="calico-system/calico-node-pclwm" Jul 10 00:59:43.194454 kubelet[1620]: I0710 00:59:43.194236 1620 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/e3f796c3-b34c-45cb-8e71-c73a5126bc75-xtables-lock\") pod \"calico-node-pclwm\" (UID: \"e3f796c3-b34c-45cb-8e71-c73a5126bc75\") " pod="calico-system/calico-node-pclwm" Jul 10 00:59:43.194454 kubelet[1620]: I0710 00:59:43.194244 1620 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-9dqcc\" (UniqueName: \"kubernetes.io/projected/e3f796c3-b34c-45cb-8e71-c73a5126bc75-kube-api-access-9dqcc\") pod \"calico-node-pclwm\" (UID: \"e3f796c3-b34c-45cb-8e71-c73a5126bc75\") " pod="calico-system/calico-node-pclwm" Jul 10 00:59:43.194454 kubelet[1620]: I0710 00:59:43.194253 1620 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/f8539811-5553-42c4-b972-5bfd95d2de66-registration-dir\") pod \"csi-node-driver-bfm74\" (UID: \"f8539811-5553-42c4-b972-5bfd95d2de66\") " pod="calico-system/csi-node-driver-bfm74" Jul 10 00:59:43.194454 kubelet[1620]: I0710 00:59:43.194262 1620 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-v4kw8\" (UniqueName: \"kubernetes.io/projected/f8539811-5553-42c4-b972-5bfd95d2de66-kube-api-access-v4kw8\") pod \"csi-node-driver-bfm74\" (UID: \"f8539811-5553-42c4-b972-5bfd95d2de66\") " pod="calico-system/csi-node-driver-bfm74" Jul 10 00:59:43.194454 kubelet[1620]: I0710 00:59:43.194271 1620 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/cbe2b5f7-e2e6-4ee8-bec6-61dcbbe5b058-xtables-lock\") pod \"kube-proxy-cjdk9\" (UID: \"cbe2b5f7-e2e6-4ee8-bec6-61dcbbe5b058\") " pod="kube-system/kube-proxy-cjdk9" Jul 10 00:59:43.194547 kubelet[1620]: I0710 00:59:43.194280 1620 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/cbe2b5f7-e2e6-4ee8-bec6-61dcbbe5b058-lib-modules\") pod \"kube-proxy-cjdk9\" (UID: \"cbe2b5f7-e2e6-4ee8-bec6-61dcbbe5b058\") " pod="kube-system/kube-proxy-cjdk9" Jul 10 00:59:43.194547 kubelet[1620]: I0710 00:59:43.194289 1620 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/e3f796c3-b34c-45cb-8e71-c73a5126bc75-cni-net-dir\") pod \"calico-node-pclwm\" (UID: \"e3f796c3-b34c-45cb-8e71-c73a5126bc75\") " pod="calico-system/calico-node-pclwm" Jul 10 00:59:43.194547 kubelet[1620]: I0710 00:59:43.194297 1620 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/e3f796c3-b34c-45cb-8e71-c73a5126bc75-flexvol-driver-host\") pod \"calico-node-pclwm\" (UID: \"e3f796c3-b34c-45cb-8e71-c73a5126bc75\") " pod="calico-system/calico-node-pclwm" Jul 10 00:59:43.194547 kubelet[1620]: I0710 00:59:43.194305 1620 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/e3f796c3-b34c-45cb-8e71-c73a5126bc75-policysync\") pod \"calico-node-pclwm\" (UID: \"e3f796c3-b34c-45cb-8e71-c73a5126bc75\") " pod="calico-system/calico-node-pclwm" Jul 10 00:59:43.295825 kubelet[1620]: I0710 00:59:43.295806 1620 swap_util.go:74] "error creating dir to test if tmpfs noswap is enabled. Assuming not supported" mount path="" error="stat /var/lib/kubelet/plugins/kubernetes.io/empty-dir: no such file or directory" Jul 10 00:59:43.296724 kubelet[1620]: E0710 00:59:43.296714 1620 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 10 00:59:43.296790 kubelet[1620]: W0710 00:59:43.296779 1620 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 10 00:59:43.296852 kubelet[1620]: E0710 00:59:43.296843 1620 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 10 00:59:43.296984 kubelet[1620]: E0710 00:59:43.296972 1620 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 10 00:59:43.297034 kubelet[1620]: W0710 00:59:43.297025 1620 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 10 00:59:43.297081 kubelet[1620]: E0710 00:59:43.297073 1620 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 10 00:59:43.297199 kubelet[1620]: E0710 00:59:43.297193 1620 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 10 00:59:43.297242 kubelet[1620]: W0710 00:59:43.297234 1620 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 10 00:59:43.297287 kubelet[1620]: E0710 00:59:43.297280 1620 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 10 00:59:43.297443 kubelet[1620]: E0710 00:59:43.297436 1620 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 10 00:59:43.297488 kubelet[1620]: W0710 00:59:43.297479 1620 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 10 00:59:43.297644 kubelet[1620]: E0710 00:59:43.297636 1620 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 10 00:59:43.300092 kubelet[1620]: E0710 00:59:43.300084 1620 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 10 00:59:43.300151 kubelet[1620]: W0710 00:59:43.300143 1620 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 10 00:59:43.300199 kubelet[1620]: E0710 00:59:43.300191 1620 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 10 00:59:43.300353 kubelet[1620]: E0710 00:59:43.300347 1620 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 10 00:59:43.300397 kubelet[1620]: W0710 00:59:43.300388 1620 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 10 00:59:43.300483 kubelet[1620]: E0710 00:59:43.300475 1620 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 10 00:59:43.300635 kubelet[1620]: E0710 00:59:43.300629 1620 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 10 00:59:43.300679 kubelet[1620]: W0710 00:59:43.300671 1620 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 10 00:59:43.300727 kubelet[1620]: E0710 00:59:43.300719 1620 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 10 00:59:43.300865 kubelet[1620]: E0710 00:59:43.300858 1620 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 10 00:59:43.300918 kubelet[1620]: W0710 00:59:43.300911 1620 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 10 00:59:43.300968 kubelet[1620]: E0710 00:59:43.300961 1620 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 10 00:59:43.301108 kubelet[1620]: E0710 00:59:43.301102 1620 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 10 00:59:43.301151 kubelet[1620]: W0710 00:59:43.301142 1620 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 10 00:59:43.301200 kubelet[1620]: E0710 00:59:43.301192 1620 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 10 00:59:43.301330 kubelet[1620]: E0710 00:59:43.301324 1620 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 10 00:59:43.301372 kubelet[1620]: W0710 00:59:43.301364 1620 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 10 00:59:43.301434 kubelet[1620]: E0710 00:59:43.301427 1620 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 10 00:59:43.301568 kubelet[1620]: E0710 00:59:43.301562 1620 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 10 00:59:43.301612 kubelet[1620]: W0710 00:59:43.301605 1620 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 10 00:59:43.301661 kubelet[1620]: E0710 00:59:43.301654 1620 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 10 00:59:43.301788 kubelet[1620]: E0710 00:59:43.301783 1620 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 10 00:59:43.301831 kubelet[1620]: W0710 00:59:43.301822 1620 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 10 00:59:43.301876 kubelet[1620]: E0710 00:59:43.301869 1620 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 10 00:59:43.302015 kubelet[1620]: E0710 00:59:43.302010 1620 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 10 00:59:43.302058 kubelet[1620]: W0710 00:59:43.302050 1620 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 10 00:59:43.302104 kubelet[1620]: E0710 00:59:43.302097 1620 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 10 00:59:43.302241 kubelet[1620]: E0710 00:59:43.302235 1620 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 10 00:59:43.302285 kubelet[1620]: W0710 00:59:43.302276 1620 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 10 00:59:43.302329 kubelet[1620]: E0710 00:59:43.302321 1620 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 10 00:59:43.501452 kubelet[1620]: E0710 00:59:43.500672 1620 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 10 00:59:43.501452 kubelet[1620]: W0710 00:59:43.500688 1620 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 10 00:59:43.501452 kubelet[1620]: E0710 00:59:43.500701 1620 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 10 00:59:43.518983 kubelet[1620]: E0710 00:59:43.518964 1620 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 10 00:59:43.519082 kubelet[1620]: W0710 00:59:43.519071 1620 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 10 00:59:43.519144 kubelet[1620]: E0710 00:59:43.519129 1620 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 10 00:59:43.519317 kubelet[1620]: E0710 00:59:43.519306 1620 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 10 00:59:43.519317 kubelet[1620]: W0710 00:59:43.519315 1620 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 10 00:59:43.519369 kubelet[1620]: E0710 00:59:43.519322 1620 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 10 00:59:43.694566 env[1286]: time="2025-07-10T00:59:43.694516236Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-cjdk9,Uid:cbe2b5f7-e2e6-4ee8-bec6-61dcbbe5b058,Namespace:kube-system,Attempt:0,}" Jul 10 00:59:43.697634 env[1286]: time="2025-07-10T00:59:43.697609369Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-pclwm,Uid:e3f796c3-b34c-45cb-8e71-c73a5126bc75,Namespace:calico-system,Attempt:0,}" Jul 10 00:59:44.062430 kubelet[1620]: E0710 00:59:44.062397 1620 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 00:59:44.470181 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2661513246.mount: Deactivated successfully. Jul 10 00:59:44.473052 env[1286]: time="2025-07-10T00:59:44.472987744Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 10 00:59:44.474932 env[1286]: time="2025-07-10T00:59:44.474914151Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 10 00:59:44.475962 env[1286]: time="2025-07-10T00:59:44.475938263Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 10 00:59:44.476296 env[1286]: time="2025-07-10T00:59:44.476278482Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 10 00:59:44.477079 env[1286]: time="2025-07-10T00:59:44.477061837Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 10 00:59:44.478139 env[1286]: time="2025-07-10T00:59:44.478122372Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 10 00:59:44.478851 env[1286]: time="2025-07-10T00:59:44.478836634Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 10 00:59:44.480070 env[1286]: time="2025-07-10T00:59:44.480051427Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 10 00:59:44.499478 env[1286]: time="2025-07-10T00:59:44.493916058Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 10 00:59:44.499478 env[1286]: time="2025-07-10T00:59:44.493932335Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 10 00:59:44.499478 env[1286]: time="2025-07-10T00:59:44.493945658Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 10 00:59:44.499478 env[1286]: time="2025-07-10T00:59:44.494073394Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/26503392d873b94deccbc780bd0d8865e294c4f64f0c900ca3a1046971a20a20 pid=1698 runtime=io.containerd.runc.v2 Jul 10 00:59:44.499694 env[1286]: time="2025-07-10T00:59:44.493761190Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 10 00:59:44.499694 env[1286]: time="2025-07-10T00:59:44.493785619Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 10 00:59:44.499694 env[1286]: time="2025-07-10T00:59:44.493792591Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 10 00:59:44.499694 env[1286]: time="2025-07-10T00:59:44.493876475Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/af1b55622ef1260faf116a0f7cacf2b525b3832b306c27a1e449fdb079178e7b pid=1700 runtime=io.containerd.runc.v2 Jul 10 00:59:44.511331 systemd[1]: Started cri-containerd-af1b55622ef1260faf116a0f7cacf2b525b3832b306c27a1e449fdb079178e7b.scope. Jul 10 00:59:44.516335 systemd[1]: Started cri-containerd-26503392d873b94deccbc780bd0d8865e294c4f64f0c900ca3a1046971a20a20.scope. Jul 10 00:59:44.525733 kernel: kauditd_printk_skb: 243 callbacks suppressed Jul 10 00:59:44.525801 kernel: audit: type=1400 audit(1752109184.523:424): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:44.523000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:44.523000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:44.530865 kernel: audit: type=1400 audit(1752109184.523:425): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:44.535526 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Jul 10 00:59:44.535612 kernel: audit: audit_lost=1 audit_rate_limit=0 audit_backlog_limit=64 Jul 10 00:59:44.535633 kernel: audit: type=1400 audit(1752109184.523:426): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:44.535650 kernel: audit: backlog limit exceeded Jul 10 00:59:44.523000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:44.539135 kernel: audit: type=1400 audit(1752109184.523:427): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:44.539177 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Jul 10 00:59:44.539197 kernel: audit: type=1400 audit(1752109184.523:428): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:44.539213 kernel: audit: audit_lost=2 audit_rate_limit=0 audit_backlog_limit=64 Jul 10 00:59:44.523000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:44.523000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:44.523000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:44.523000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:44.523000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:44.523000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:44.523000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:44.523000 audit: BPF prog-id=58 op=LOAD Jul 10 00:59:44.526000 audit[1719]: AVC avc: denied { bpf } for pid=1719 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:44.526000 audit[1719]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00011fc48 a2=10 a3=1c items=0 ppid=1700 pid=1719 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:59:44.526000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6166316235353632326566313236306661663131366130663763616366 Jul 10 00:59:44.526000 audit[1719]: AVC avc: denied { perfmon } for pid=1719 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:44.526000 audit[1719]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00011f6b0 a2=3c a3=c items=0 ppid=1700 pid=1719 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:59:44.526000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6166316235353632326566313236306661663131366130663763616366 Jul 10 00:59:44.526000 audit[1719]: AVC avc: denied { bpf } for pid=1719 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:44.526000 audit[1719]: AVC avc: denied { bpf } for pid=1719 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:44.526000 audit[1719]: AVC avc: denied { bpf } for pid=1719 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:44.526000 audit[1719]: AVC avc: denied { perfmon } for pid=1719 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:44.526000 audit[1719]: AVC avc: denied { perfmon } for pid=1719 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:44.526000 audit[1719]: AVC avc: denied { perfmon } for pid=1719 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:44.526000 audit[1719]: AVC avc: denied { perfmon } for pid=1719 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:44.526000 audit[1719]: AVC avc: denied { perfmon } for pid=1719 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:44.526000 audit[1719]: AVC avc: denied { bpf } for pid=1719 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:44.526000 audit[1719]: AVC avc: denied { bpf } for pid=1719 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:44.526000 audit: BPF prog-id=59 op=LOAD Jul 10 00:59:44.526000 audit[1719]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011f9d8 a2=78 a3=c000280a10 items=0 ppid=1700 pid=1719 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:59:44.526000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6166316235353632326566313236306661663131366130663763616366 Jul 10 00:59:44.526000 audit[1719]: AVC avc: denied { bpf } for pid=1719 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:44.526000 audit[1719]: AVC avc: denied { bpf } for pid=1719 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:44.526000 audit[1719]: AVC avc: denied { perfmon } for pid=1719 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:44.526000 audit[1719]: AVC avc: denied { perfmon } for pid=1719 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:44.526000 audit[1719]: AVC avc: denied { perfmon } for pid=1719 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:44.526000 audit[1719]: AVC avc: denied { perfmon } for pid=1719 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:44.526000 audit[1719]: AVC avc: denied { perfmon } for pid=1719 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:44.526000 audit[1719]: AVC avc: denied { bpf } for pid=1719 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:44.526000 audit[1719]: AVC avc: denied { bpf } for pid=1719 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:44.526000 audit: BPF prog-id=60 op=LOAD Jul 10 00:59:44.526000 audit[1719]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00011f770 a2=78 a3=c000280a58 items=0 ppid=1700 pid=1719 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:59:44.526000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6166316235353632326566313236306661663131366130663763616366 Jul 10 00:59:44.526000 audit: BPF prog-id=60 op=UNLOAD Jul 10 00:59:44.526000 audit: BPF prog-id=59 op=UNLOAD Jul 10 00:59:44.526000 audit[1719]: AVC avc: denied { bpf } for pid=1719 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:44.526000 audit[1719]: AVC avc: denied { bpf } for pid=1719 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:44.526000 audit[1719]: AVC avc: denied { bpf } for pid=1719 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:44.526000 audit[1719]: AVC avc: denied { perfmon } for pid=1719 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:44.526000 audit[1719]: AVC avc: denied { perfmon } for pid=1719 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:44.526000 audit[1719]: AVC avc: denied { perfmon } for pid=1719 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:44.526000 audit[1719]: AVC avc: denied { perfmon } for pid=1719 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:44.526000 audit[1719]: AVC avc: denied { perfmon } for pid=1719 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:44.526000 audit[1719]: AVC avc: denied { bpf } for pid=1719 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:44.526000 audit[1719]: AVC avc: denied { bpf } for pid=1719 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:44.526000 audit: BPF prog-id=61 op=LOAD Jul 10 00:59:44.526000 audit[1719]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011fc30 a2=78 a3=c000280e68 items=0 ppid=1700 pid=1719 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:59:44.526000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6166316235353632326566313236306661663131366130663763616366 Jul 10 00:59:44.530000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:44.530000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:44.530000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:44.530000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:44.530000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:44.530000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:44.534000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:44.542000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:44.542000 audit: BPF prog-id=62 op=LOAD Jul 10 00:59:44.543000 audit[1726]: AVC avc: denied { bpf } for pid=1726 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:44.543000 audit[1726]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=1698 pid=1726 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:59:44.543000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3236353033333932643837336239346465636362633738306264306438 Jul 10 00:59:44.543000 audit[1726]: AVC avc: denied { perfmon } for pid=1726 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:44.543000 audit[1726]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=1698 pid=1726 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:59:44.543000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3236353033333932643837336239346465636362633738306264306438 Jul 10 00:59:44.543000 audit[1726]: AVC avc: denied { bpf } for pid=1726 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:44.543000 audit[1726]: AVC avc: denied { bpf } for pid=1726 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:44.543000 audit[1726]: AVC avc: denied { bpf } for pid=1726 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:44.543000 audit[1726]: AVC avc: denied { perfmon } for pid=1726 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:44.543000 audit[1726]: AVC avc: denied { perfmon } for pid=1726 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:44.543000 audit[1726]: AVC avc: denied { perfmon } for pid=1726 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:44.543000 audit[1726]: AVC avc: denied { perfmon } for pid=1726 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:44.543000 audit[1726]: AVC avc: denied { perfmon } for pid=1726 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:44.543000 audit[1726]: AVC avc: denied { bpf } for pid=1726 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:44.543000 audit[1726]: AVC avc: denied { bpf } for pid=1726 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:44.543000 audit: BPF prog-id=63 op=LOAD Jul 10 00:59:44.543000 audit[1726]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000308350 items=0 ppid=1698 pid=1726 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:59:44.543000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3236353033333932643837336239346465636362633738306264306438 Jul 10 00:59:44.543000 audit[1726]: AVC avc: denied { bpf } for pid=1726 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:44.543000 audit[1726]: AVC avc: denied { bpf } for pid=1726 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:44.543000 audit[1726]: AVC avc: denied { perfmon } for pid=1726 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:44.543000 audit[1726]: AVC avc: denied { perfmon } for pid=1726 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:44.543000 audit[1726]: AVC avc: denied { perfmon } for pid=1726 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:44.543000 audit[1726]: AVC avc: denied { perfmon } for pid=1726 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:44.543000 audit[1726]: AVC avc: denied { perfmon } for pid=1726 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:44.543000 audit[1726]: AVC avc: denied { bpf } for pid=1726 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:44.543000 audit[1726]: AVC avc: denied { bpf } for pid=1726 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:44.543000 audit: BPF prog-id=64 op=LOAD Jul 10 00:59:44.543000 audit[1726]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000308398 items=0 ppid=1698 pid=1726 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:59:44.543000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3236353033333932643837336239346465636362633738306264306438 Jul 10 00:59:44.543000 audit: BPF prog-id=64 op=UNLOAD Jul 10 00:59:44.543000 audit: BPF prog-id=63 op=UNLOAD Jul 10 00:59:44.543000 audit[1726]: AVC avc: denied { bpf } for pid=1726 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:44.543000 audit[1726]: AVC avc: denied { bpf } for pid=1726 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:44.543000 audit[1726]: AVC avc: denied { bpf } for pid=1726 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:44.543000 audit[1726]: AVC avc: denied { perfmon } for pid=1726 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:44.543000 audit[1726]: AVC avc: denied { perfmon } for pid=1726 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:44.543000 audit[1726]: AVC avc: denied { perfmon } for pid=1726 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:44.543000 audit[1726]: AVC avc: denied { perfmon } for pid=1726 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:44.543000 audit[1726]: AVC avc: denied { perfmon } for pid=1726 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:44.543000 audit[1726]: AVC avc: denied { bpf } for pid=1726 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:44.543000 audit[1726]: AVC avc: denied { bpf } for pid=1726 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:44.543000 audit: BPF prog-id=65 op=LOAD Jul 10 00:59:44.543000 audit[1726]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003087a8 items=0 ppid=1698 pid=1726 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:59:44.543000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3236353033333932643837336239346465636362633738306264306438 Jul 10 00:59:44.551730 env[1286]: time="2025-07-10T00:59:44.551705811Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-pclwm,Uid:e3f796c3-b34c-45cb-8e71-c73a5126bc75,Namespace:calico-system,Attempt:0,} returns sandbox id \"af1b55622ef1260faf116a0f7cacf2b525b3832b306c27a1e449fdb079178e7b\"" Jul 10 00:59:44.555094 env[1286]: time="2025-07-10T00:59:44.555039351Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.2\"" Jul 10 00:59:44.556139 env[1286]: time="2025-07-10T00:59:44.556120838Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-cjdk9,Uid:cbe2b5f7-e2e6-4ee8-bec6-61dcbbe5b058,Namespace:kube-system,Attempt:0,} returns sandbox id \"26503392d873b94deccbc780bd0d8865e294c4f64f0c900ca3a1046971a20a20\"" Jul 10 00:59:45.063242 kubelet[1620]: E0710 00:59:45.063198 1620 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 00:59:45.173944 kubelet[1620]: E0710 00:59:45.173657 1620 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-bfm74" podUID="f8539811-5553-42c4-b972-5bfd95d2de66" Jul 10 00:59:45.846920 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1458988348.mount: Deactivated successfully. Jul 10 00:59:45.969849 env[1286]: time="2025-07-10T00:59:45.969804369Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 10 00:59:45.970449 env[1286]: time="2025-07-10T00:59:45.970434599Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:639615519fa6f7bc4b4756066ba9780068fd291eacc36c120f6c555e62f2b00e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 10 00:59:45.971819 env[1286]: time="2025-07-10T00:59:45.971806708Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 10 00:59:45.973368 env[1286]: time="2025-07-10T00:59:45.973354828Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:972be127eaecd7d1a2d5393b8d14f1ae8f88550bee83e0519e9590c7e15eb41b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 10 00:59:45.973736 env[1286]: time="2025-07-10T00:59:45.973717728Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.2\" returns image reference \"sha256:639615519fa6f7bc4b4756066ba9780068fd291eacc36c120f6c555e62f2b00e\"" Jul 10 00:59:45.974779 env[1286]: time="2025-07-10T00:59:45.974759771Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.32.6\"" Jul 10 00:59:45.976171 env[1286]: time="2025-07-10T00:59:45.976147045Z" level=info msg="CreateContainer within sandbox \"af1b55622ef1260faf116a0f7cacf2b525b3832b306c27a1e449fdb079178e7b\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Jul 10 00:59:45.981933 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount135048781.mount: Deactivated successfully. Jul 10 00:59:45.984323 env[1286]: time="2025-07-10T00:59:45.984300373Z" level=info msg="CreateContainer within sandbox \"af1b55622ef1260faf116a0f7cacf2b525b3832b306c27a1e449fdb079178e7b\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"a21c2db37a9ba5c9fdfbce06e5941be59882d614d5afd4e0c6a18bb70e4b8f96\"" Jul 10 00:59:45.984937 env[1286]: time="2025-07-10T00:59:45.984925251Z" level=info msg="StartContainer for \"a21c2db37a9ba5c9fdfbce06e5941be59882d614d5afd4e0c6a18bb70e4b8f96\"" Jul 10 00:59:45.997380 systemd[1]: Started cri-containerd-a21c2db37a9ba5c9fdfbce06e5941be59882d614d5afd4e0c6a18bb70e4b8f96.scope. Jul 10 00:59:46.007000 audit[1773]: AVC avc: denied { perfmon } for pid=1773 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:46.007000 audit[1773]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f2568540c38 items=0 ppid=1700 pid=1773 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:59:46.007000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6132316332646233376139626135633966646662636530366535393431 Jul 10 00:59:46.007000 audit[1773]: AVC avc: denied { bpf } for pid=1773 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:46.007000 audit[1773]: AVC avc: denied { bpf } for pid=1773 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:46.007000 audit[1773]: AVC avc: denied { bpf } for pid=1773 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:46.007000 audit[1773]: AVC avc: denied { perfmon } for pid=1773 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:46.007000 audit[1773]: AVC avc: denied { perfmon } for pid=1773 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:46.007000 audit[1773]: AVC avc: denied { perfmon } for pid=1773 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:46.007000 audit[1773]: AVC avc: denied { perfmon } for pid=1773 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:46.007000 audit[1773]: AVC avc: denied { perfmon } for pid=1773 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:46.007000 audit[1773]: AVC avc: denied { bpf } for pid=1773 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:46.007000 audit[1773]: AVC avc: denied { bpf } for pid=1773 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:46.007000 audit: BPF prog-id=66 op=LOAD Jul 10 00:59:46.007000 audit[1773]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c00025a448 items=0 ppid=1700 pid=1773 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:59:46.007000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6132316332646233376139626135633966646662636530366535393431 Jul 10 00:59:46.008000 audit[1773]: AVC avc: denied { bpf } for pid=1773 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:46.008000 audit[1773]: AVC avc: denied { bpf } for pid=1773 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:46.008000 audit[1773]: AVC avc: denied { perfmon } for pid=1773 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:46.008000 audit[1773]: AVC avc: denied { perfmon } for pid=1773 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:46.008000 audit[1773]: AVC avc: denied { perfmon } for pid=1773 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:46.008000 audit[1773]: AVC avc: denied { perfmon } for pid=1773 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:46.008000 audit[1773]: AVC avc: denied { perfmon } for pid=1773 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:46.008000 audit[1773]: AVC avc: denied { bpf } for pid=1773 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:46.008000 audit[1773]: AVC avc: denied { bpf } for pid=1773 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:46.008000 audit: BPF prog-id=67 op=LOAD Jul 10 00:59:46.008000 audit[1773]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c00025a498 items=0 ppid=1700 pid=1773 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:59:46.008000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6132316332646233376139626135633966646662636530366535393431 Jul 10 00:59:46.008000 audit: BPF prog-id=67 op=UNLOAD Jul 10 00:59:46.008000 audit: BPF prog-id=66 op=UNLOAD Jul 10 00:59:46.008000 audit[1773]: AVC avc: denied { bpf } for pid=1773 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:46.008000 audit[1773]: AVC avc: denied { bpf } for pid=1773 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:46.008000 audit[1773]: AVC avc: denied { bpf } for pid=1773 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:46.008000 audit[1773]: AVC avc: denied { perfmon } for pid=1773 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:46.008000 audit[1773]: AVC avc: denied { perfmon } for pid=1773 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:46.008000 audit[1773]: AVC avc: denied { perfmon } for pid=1773 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:46.008000 audit[1773]: AVC avc: denied { perfmon } for pid=1773 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:46.008000 audit[1773]: AVC avc: denied { perfmon } for pid=1773 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:46.008000 audit[1773]: AVC avc: denied { bpf } for pid=1773 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:46.008000 audit[1773]: AVC avc: denied { bpf } for pid=1773 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:46.008000 audit: BPF prog-id=68 op=LOAD Jul 10 00:59:46.008000 audit[1773]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c00025a528 items=0 ppid=1700 pid=1773 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:59:46.008000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6132316332646233376139626135633966646662636530366535393431 Jul 10 00:59:46.024792 systemd[1]: cri-containerd-a21c2db37a9ba5c9fdfbce06e5941be59882d614d5afd4e0c6a18bb70e4b8f96.scope: Deactivated successfully. Jul 10 00:59:46.025516 env[1286]: time="2025-07-10T00:59:46.025486996Z" level=info msg="StartContainer for \"a21c2db37a9ba5c9fdfbce06e5941be59882d614d5afd4e0c6a18bb70e4b8f96\" returns successfully" Jul 10 00:59:46.029000 audit: BPF prog-id=68 op=UNLOAD Jul 10 00:59:46.063908 kubelet[1620]: E0710 00:59:46.063854 1620 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 00:59:46.105293 env[1286]: time="2025-07-10T00:59:46.104202525Z" level=info msg="shim disconnected" id=a21c2db37a9ba5c9fdfbce06e5941be59882d614d5afd4e0c6a18bb70e4b8f96 Jul 10 00:59:46.105293 env[1286]: time="2025-07-10T00:59:46.104241300Z" level=warning msg="cleaning up after shim disconnected" id=a21c2db37a9ba5c9fdfbce06e5941be59882d614d5afd4e0c6a18bb70e4b8f96 namespace=k8s.io Jul 10 00:59:46.105293 env[1286]: time="2025-07-10T00:59:46.104249110Z" level=info msg="cleaning up dead shim" Jul 10 00:59:46.111699 env[1286]: time="2025-07-10T00:59:46.111673164Z" level=warning msg="cleanup warnings time=\"2025-07-10T00:59:46Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=1812 runtime=io.containerd.runc.v2\n" Jul 10 00:59:46.982907 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3855487202.mount: Deactivated successfully. Jul 10 00:59:47.064620 kubelet[1620]: E0710 00:59:47.064582 1620 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 00:59:47.174032 kubelet[1620]: E0710 00:59:47.173805 1620 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-bfm74" podUID="f8539811-5553-42c4-b972-5bfd95d2de66" Jul 10 00:59:47.467469 env[1286]: time="2025-07-10T00:59:47.467323362Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.32.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 10 00:59:47.468198 env[1286]: time="2025-07-10T00:59:47.468182606Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:63f0cbe3b7339c5d006efc9964228e48271bae73039320037c451b5e8f763e02,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 10 00:59:47.469325 env[1286]: time="2025-07-10T00:59:47.469291389Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.32.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 10 00:59:47.470237 env[1286]: time="2025-07-10T00:59:47.470220532Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:b13d9da413b983d130bf090b83fce12e1ccc704e95f366da743c18e964d9d7e9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 10 00:59:47.470502 env[1286]: time="2025-07-10T00:59:47.470485459Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.32.6\" returns image reference \"sha256:63f0cbe3b7339c5d006efc9964228e48271bae73039320037c451b5e8f763e02\"" Jul 10 00:59:47.471648 env[1286]: time="2025-07-10T00:59:47.471629952Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.30.2\"" Jul 10 00:59:47.472466 env[1286]: time="2025-07-10T00:59:47.472364218Z" level=info msg="CreateContainer within sandbox \"26503392d873b94deccbc780bd0d8865e294c4f64f0c900ca3a1046971a20a20\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Jul 10 00:59:47.478792 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3043202144.mount: Deactivated successfully. Jul 10 00:59:47.482970 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount116771466.mount: Deactivated successfully. Jul 10 00:59:47.485988 env[1286]: time="2025-07-10T00:59:47.485962204Z" level=info msg="CreateContainer within sandbox \"26503392d873b94deccbc780bd0d8865e294c4f64f0c900ca3a1046971a20a20\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"4732b66d2d8e10255225fda87589cde1f076005b7a3b6b96c7214bcb1605f379\"" Jul 10 00:59:47.486627 env[1286]: time="2025-07-10T00:59:47.486607530Z" level=info msg="StartContainer for \"4732b66d2d8e10255225fda87589cde1f076005b7a3b6b96c7214bcb1605f379\"" Jul 10 00:59:47.503504 systemd[1]: Started cri-containerd-4732b66d2d8e10255225fda87589cde1f076005b7a3b6b96c7214bcb1605f379.scope. Jul 10 00:59:47.515000 audit[1840]: AVC avc: denied { perfmon } for pid=1840 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:47.515000 audit[1840]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001476b0 a2=3c a3=7fd94c767ee8 items=0 ppid=1698 pid=1840 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:59:47.515000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3437333262363664326438653130323535323235666461383735383963 Jul 10 00:59:47.515000 audit[1840]: AVC avc: denied { bpf } for pid=1840 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:47.515000 audit[1840]: AVC avc: denied { bpf } for pid=1840 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:47.515000 audit[1840]: AVC avc: denied { bpf } for pid=1840 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:47.515000 audit[1840]: AVC avc: denied { perfmon } for pid=1840 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:47.515000 audit[1840]: AVC avc: denied { perfmon } for pid=1840 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:47.515000 audit[1840]: AVC avc: denied { perfmon } for pid=1840 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:47.515000 audit[1840]: AVC avc: denied { perfmon } for pid=1840 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:47.515000 audit[1840]: AVC avc: denied { perfmon } for pid=1840 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:47.515000 audit[1840]: AVC avc: denied { bpf } for pid=1840 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:47.515000 audit[1840]: AVC avc: denied { bpf } for pid=1840 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:47.515000 audit: BPF prog-id=69 op=LOAD Jul 10 00:59:47.515000 audit[1840]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001479d8 a2=78 a3=c0003da6b8 items=0 ppid=1698 pid=1840 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:59:47.515000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3437333262363664326438653130323535323235666461383735383963 Jul 10 00:59:47.515000 audit[1840]: AVC avc: denied { bpf } for pid=1840 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:47.515000 audit[1840]: AVC avc: denied { bpf } for pid=1840 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:47.515000 audit[1840]: AVC avc: denied { perfmon } for pid=1840 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:47.515000 audit[1840]: AVC avc: denied { perfmon } for pid=1840 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:47.515000 audit[1840]: AVC avc: denied { perfmon } for pid=1840 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:47.515000 audit[1840]: AVC avc: denied { perfmon } for pid=1840 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:47.515000 audit[1840]: AVC avc: denied { perfmon } for pid=1840 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:47.515000 audit[1840]: AVC avc: denied { bpf } for pid=1840 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:47.515000 audit[1840]: AVC avc: denied { bpf } for pid=1840 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:47.515000 audit: BPF prog-id=70 op=LOAD Jul 10 00:59:47.515000 audit[1840]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000147770 a2=78 a3=c0003da708 items=0 ppid=1698 pid=1840 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:59:47.515000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3437333262363664326438653130323535323235666461383735383963 Jul 10 00:59:47.515000 audit: BPF prog-id=70 op=UNLOAD Jul 10 00:59:47.515000 audit: BPF prog-id=69 op=UNLOAD Jul 10 00:59:47.515000 audit[1840]: AVC avc: denied { bpf } for pid=1840 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:47.515000 audit[1840]: AVC avc: denied { bpf } for pid=1840 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:47.515000 audit[1840]: AVC avc: denied { bpf } for pid=1840 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:47.515000 audit[1840]: AVC avc: denied { perfmon } for pid=1840 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:47.515000 audit[1840]: AVC avc: denied { perfmon } for pid=1840 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:47.515000 audit[1840]: AVC avc: denied { perfmon } for pid=1840 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:47.515000 audit[1840]: AVC avc: denied { perfmon } for pid=1840 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:47.515000 audit[1840]: AVC avc: denied { perfmon } for pid=1840 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:47.515000 audit[1840]: AVC avc: denied { bpf } for pid=1840 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:47.515000 audit[1840]: AVC avc: denied { bpf } for pid=1840 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:47.515000 audit: BPF prog-id=71 op=LOAD Jul 10 00:59:47.515000 audit[1840]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000147c30 a2=78 a3=c0003da798 items=0 ppid=1698 pid=1840 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:59:47.515000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3437333262363664326438653130323535323235666461383735383963 Jul 10 00:59:47.536737 env[1286]: time="2025-07-10T00:59:47.536704421Z" level=info msg="StartContainer for \"4732b66d2d8e10255225fda87589cde1f076005b7a3b6b96c7214bcb1605f379\" returns successfully" Jul 10 00:59:47.654000 audit[1899]: NETFILTER_CFG table=mangle:14 family=2 entries=1 op=nft_register_chain pid=1899 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 10 00:59:47.654000 audit[1899]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffdd78a5750 a2=0 a3=7ffdd78a573c items=0 ppid=1851 pid=1899 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:59:47.654000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Jul 10 00:59:47.654000 audit[1901]: NETFILTER_CFG table=nat:15 family=2 entries=1 op=nft_register_chain pid=1901 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 10 00:59:47.654000 audit[1901]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffeaae1e6a0 a2=0 a3=7ffeaae1e68c items=0 ppid=1851 pid=1901 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:59:47.654000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Jul 10 00:59:47.655000 audit[1902]: NETFILTER_CFG table=mangle:16 family=10 entries=1 op=nft_register_chain pid=1902 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 10 00:59:47.655000 audit[1902]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fffc8a72e10 a2=0 a3=7fffc8a72dfc items=0 ppid=1851 pid=1902 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:59:47.655000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Jul 10 00:59:47.655000 audit[1903]: NETFILTER_CFG table=nat:17 family=10 entries=1 op=nft_register_chain pid=1903 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 10 00:59:47.655000 audit[1903]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd2f59c5e0 a2=0 a3=7ffd2f59c5cc items=0 ppid=1851 pid=1903 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:59:47.655000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Jul 10 00:59:47.656000 audit[1904]: NETFILTER_CFG table=filter:18 family=2 entries=1 op=nft_register_chain pid=1904 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 10 00:59:47.656000 audit[1904]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffdbdac9a80 a2=0 a3=7ffdbdac9a6c items=0 ppid=1851 pid=1904 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:59:47.656000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Jul 10 00:59:47.656000 audit[1905]: NETFILTER_CFG table=filter:19 family=10 entries=1 op=nft_register_chain pid=1905 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 10 00:59:47.656000 audit[1905]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fffcc86c160 a2=0 a3=7fffcc86c14c items=0 ppid=1851 pid=1905 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:59:47.656000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Jul 10 00:59:47.757000 audit[1906]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_chain pid=1906 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 10 00:59:47.757000 audit[1906]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffe0be61060 a2=0 a3=7ffe0be6104c items=0 ppid=1851 pid=1906 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:59:47.757000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Jul 10 00:59:47.760000 audit[1908]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=1908 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 10 00:59:47.760000 audit[1908]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffc83488ad0 a2=0 a3=7ffc83488abc items=0 ppid=1851 pid=1908 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:59:47.760000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Jul 10 00:59:47.762000 audit[1911]: NETFILTER_CFG table=filter:22 family=2 entries=2 op=nft_register_chain pid=1911 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 10 00:59:47.762000 audit[1911]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffc5732c880 a2=0 a3=7ffc5732c86c items=0 ppid=1851 pid=1911 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:59:47.762000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Jul 10 00:59:47.763000 audit[1912]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_chain pid=1912 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 10 00:59:47.763000 audit[1912]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe2a7f4f20 a2=0 a3=7ffe2a7f4f0c items=0 ppid=1851 pid=1912 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:59:47.763000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Jul 10 00:59:47.765000 audit[1914]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_register_rule pid=1914 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 10 00:59:47.765000 audit[1914]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffe8082ba60 a2=0 a3=7ffe8082ba4c items=0 ppid=1851 pid=1914 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:59:47.765000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Jul 10 00:59:47.766000 audit[1915]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_chain pid=1915 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 10 00:59:47.766000 audit[1915]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc348b9ad0 a2=0 a3=7ffc348b9abc items=0 ppid=1851 pid=1915 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:59:47.766000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Jul 10 00:59:47.768000 audit[1917]: NETFILTER_CFG table=filter:26 family=2 entries=1 op=nft_register_rule pid=1917 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 10 00:59:47.768000 audit[1917]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffd499de970 a2=0 a3=7ffd499de95c items=0 ppid=1851 pid=1917 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:59:47.768000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Jul 10 00:59:47.770000 audit[1920]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_rule pid=1920 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 10 00:59:47.770000 audit[1920]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffce57e9750 a2=0 a3=7ffce57e973c items=0 ppid=1851 pid=1920 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:59:47.770000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 Jul 10 00:59:47.771000 audit[1921]: NETFILTER_CFG table=filter:28 family=2 entries=1 op=nft_register_chain pid=1921 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 10 00:59:47.771000 audit[1921]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffdb749d330 a2=0 a3=7ffdb749d31c items=0 ppid=1851 pid=1921 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:59:47.771000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Jul 10 00:59:47.773000 audit[1923]: NETFILTER_CFG table=filter:29 family=2 entries=1 op=nft_register_rule pid=1923 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 10 00:59:47.773000 audit[1923]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffdabe7f1a0 a2=0 a3=7ffdabe7f18c items=0 ppid=1851 pid=1923 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:59:47.773000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Jul 10 00:59:47.773000 audit[1924]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_chain pid=1924 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 10 00:59:47.773000 audit[1924]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff17249f70 a2=0 a3=7fff17249f5c items=0 ppid=1851 pid=1924 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:59:47.773000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Jul 10 00:59:47.775000 audit[1926]: NETFILTER_CFG table=filter:31 family=2 entries=1 op=nft_register_rule pid=1926 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 10 00:59:47.775000 audit[1926]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fff640aa0c0 a2=0 a3=7fff640aa0ac items=0 ppid=1851 pid=1926 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:59:47.775000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Jul 10 00:59:47.777000 audit[1929]: NETFILTER_CFG table=filter:32 family=2 entries=1 op=nft_register_rule pid=1929 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 10 00:59:47.777000 audit[1929]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffc9d683e60 a2=0 a3=7ffc9d683e4c items=0 ppid=1851 pid=1929 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:59:47.777000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Jul 10 00:59:47.779000 audit[1932]: NETFILTER_CFG table=filter:33 family=2 entries=1 op=nft_register_rule pid=1932 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 10 00:59:47.779000 audit[1932]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fff5eaa0fe0 a2=0 a3=7fff5eaa0fcc items=0 ppid=1851 pid=1932 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:59:47.779000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Jul 10 00:59:47.780000 audit[1933]: NETFILTER_CFG table=nat:34 family=2 entries=1 op=nft_register_chain pid=1933 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 10 00:59:47.780000 audit[1933]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffccabd9b10 a2=0 a3=7ffccabd9afc items=0 ppid=1851 pid=1933 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:59:47.780000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Jul 10 00:59:47.781000 audit[1935]: NETFILTER_CFG table=nat:35 family=2 entries=2 op=nft_register_chain pid=1935 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 10 00:59:47.781000 audit[1935]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffd85e88740 a2=0 a3=7ffd85e8872c items=0 ppid=1851 pid=1935 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:59:47.781000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Jul 10 00:59:47.810000 audit[1939]: NETFILTER_CFG table=nat:36 family=2 entries=2 op=nft_register_chain pid=1939 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 10 00:59:47.810000 audit[1939]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7fff0fafd7f0 a2=0 a3=7fff0fafd7dc items=0 ppid=1851 pid=1939 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:59:47.810000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Jul 10 00:59:47.811000 audit[1940]: NETFILTER_CFG table=nat:37 family=2 entries=1 op=nft_register_chain pid=1940 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 10 00:59:47.811000 audit[1940]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe29a872e0 a2=0 a3=7ffe29a872cc items=0 ppid=1851 pid=1940 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:59:47.811000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Jul 10 00:59:47.812000 audit[1942]: NETFILTER_CFG table=nat:38 family=2 entries=2 op=nft_register_chain pid=1942 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 10 00:59:47.812000 audit[1942]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffc55c06c00 a2=0 a3=7ffc55c06bec items=0 ppid=1851 pid=1942 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:59:47.812000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Jul 10 00:59:47.830000 audit[1948]: NETFILTER_CFG table=filter:39 family=2 entries=6 op=nft_register_rule pid=1948 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 10 00:59:47.830000 audit[1948]: SYSCALL arch=c000003e syscall=46 success=yes exit=3760 a0=3 a1=7ffcbc2b8f80 a2=0 a3=7ffcbc2b8f6c items=0 ppid=1851 pid=1948 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:59:47.830000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 10 00:59:47.849000 audit[1948]: NETFILTER_CFG table=nat:40 family=2 entries=68 op=nft_register_chain pid=1948 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 10 00:59:47.849000 audit[1948]: SYSCALL arch=c000003e syscall=46 success=yes exit=32628 a0=3 a1=7ffcbc2b8f80 a2=0 a3=7ffcbc2b8f6c items=0 ppid=1851 pid=1948 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:59:47.849000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 10 00:59:47.857000 audit[1957]: NETFILTER_CFG table=filter:41 family=10 entries=1 op=nft_register_chain pid=1957 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 10 00:59:47.857000 audit[1957]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffe554322e0 a2=0 a3=7ffe554322cc items=0 ppid=1851 pid=1957 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:59:47.857000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Jul 10 00:59:47.860000 audit[1959]: NETFILTER_CFG table=filter:42 family=10 entries=2 op=nft_register_chain pid=1959 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 10 00:59:47.860000 audit[1959]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffe6c03c9e0 a2=0 a3=7ffe6c03c9cc items=0 ppid=1851 pid=1959 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:59:47.860000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 Jul 10 00:59:47.862000 audit[1962]: NETFILTER_CFG table=filter:43 family=10 entries=2 op=nft_register_chain pid=1962 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 10 00:59:47.862000 audit[1962]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffdd8d3bbf0 a2=0 a3=7ffdd8d3bbdc items=0 ppid=1851 pid=1962 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:59:47.862000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 Jul 10 00:59:47.863000 audit[1963]: NETFILTER_CFG table=filter:44 family=10 entries=1 op=nft_register_chain pid=1963 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 10 00:59:47.863000 audit[1963]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe0ab93480 a2=0 a3=7ffe0ab9346c items=0 ppid=1851 pid=1963 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:59:47.863000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Jul 10 00:59:47.865000 audit[1965]: NETFILTER_CFG table=filter:45 family=10 entries=1 op=nft_register_rule pid=1965 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 10 00:59:47.865000 audit[1965]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffff62003c0 a2=0 a3=7ffff62003ac items=0 ppid=1851 pid=1965 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:59:47.865000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Jul 10 00:59:47.866000 audit[1966]: NETFILTER_CFG table=filter:46 family=10 entries=1 op=nft_register_chain pid=1966 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 10 00:59:47.866000 audit[1966]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffde046c850 a2=0 a3=7ffde046c83c items=0 ppid=1851 pid=1966 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:59:47.866000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Jul 10 00:59:47.867000 audit[1968]: NETFILTER_CFG table=filter:47 family=10 entries=1 op=nft_register_rule pid=1968 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 10 00:59:47.867000 audit[1968]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7fffe82176f0 a2=0 a3=7fffe82176dc items=0 ppid=1851 pid=1968 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:59:47.867000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 Jul 10 00:59:47.870000 audit[1971]: NETFILTER_CFG table=filter:48 family=10 entries=2 op=nft_register_chain pid=1971 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 10 00:59:47.870000 audit[1971]: SYSCALL arch=c000003e syscall=46 success=yes exit=828 a0=3 a1=7fff8a6627d0 a2=0 a3=7fff8a6627bc items=0 ppid=1851 pid=1971 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:59:47.870000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Jul 10 00:59:47.870000 audit[1972]: NETFILTER_CFG table=filter:49 family=10 entries=1 op=nft_register_chain pid=1972 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 10 00:59:47.870000 audit[1972]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffcfd096960 a2=0 a3=7ffcfd09694c items=0 ppid=1851 pid=1972 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:59:47.870000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Jul 10 00:59:47.872000 audit[1974]: NETFILTER_CFG table=filter:50 family=10 entries=1 op=nft_register_rule pid=1974 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 10 00:59:47.872000 audit[1974]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffc264da700 a2=0 a3=7ffc264da6ec items=0 ppid=1851 pid=1974 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:59:47.872000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Jul 10 00:59:47.873000 audit[1975]: NETFILTER_CFG table=filter:51 family=10 entries=1 op=nft_register_chain pid=1975 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 10 00:59:47.873000 audit[1975]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe85a49f50 a2=0 a3=7ffe85a49f3c items=0 ppid=1851 pid=1975 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:59:47.873000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Jul 10 00:59:47.875000 audit[1977]: NETFILTER_CFG table=filter:52 family=10 entries=1 op=nft_register_rule pid=1977 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 10 00:59:47.875000 audit[1977]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffd53e6bb40 a2=0 a3=7ffd53e6bb2c items=0 ppid=1851 pid=1977 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:59:47.875000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Jul 10 00:59:47.877000 audit[1980]: NETFILTER_CFG table=filter:53 family=10 entries=1 op=nft_register_rule pid=1980 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 10 00:59:47.877000 audit[1980]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffff72df530 a2=0 a3=7ffff72df51c items=0 ppid=1851 pid=1980 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:59:47.877000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Jul 10 00:59:47.879000 audit[1983]: NETFILTER_CFG table=filter:54 family=10 entries=1 op=nft_register_rule pid=1983 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 10 00:59:47.879000 audit[1983]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffc43f15fd0 a2=0 a3=7ffc43f15fbc items=0 ppid=1851 pid=1983 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:59:47.879000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C Jul 10 00:59:47.880000 audit[1984]: NETFILTER_CFG table=nat:55 family=10 entries=1 op=nft_register_chain pid=1984 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 10 00:59:47.880000 audit[1984]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffd5070df20 a2=0 a3=7ffd5070df0c items=0 ppid=1851 pid=1984 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:59:47.880000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Jul 10 00:59:47.882000 audit[1986]: NETFILTER_CFG table=nat:56 family=10 entries=2 op=nft_register_chain pid=1986 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 10 00:59:47.882000 audit[1986]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffe3dfb3b60 a2=0 a3=7ffe3dfb3b4c items=0 ppid=1851 pid=1986 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:59:47.882000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Jul 10 00:59:47.884000 audit[1989]: NETFILTER_CFG table=nat:57 family=10 entries=2 op=nft_register_chain pid=1989 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 10 00:59:47.884000 audit[1989]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7fff322ef3b0 a2=0 a3=7fff322ef39c items=0 ppid=1851 pid=1989 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:59:47.884000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Jul 10 00:59:47.884000 audit[1990]: NETFILTER_CFG table=nat:58 family=10 entries=1 op=nft_register_chain pid=1990 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 10 00:59:47.884000 audit[1990]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff1bc68c90 a2=0 a3=7fff1bc68c7c items=0 ppid=1851 pid=1990 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:59:47.884000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Jul 10 00:59:47.886000 audit[1992]: NETFILTER_CFG table=nat:59 family=10 entries=2 op=nft_register_chain pid=1992 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 10 00:59:47.886000 audit[1992]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffd2c5de670 a2=0 a3=7ffd2c5de65c items=0 ppid=1851 pid=1992 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:59:47.886000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Jul 10 00:59:47.887000 audit[1993]: NETFILTER_CFG table=filter:60 family=10 entries=1 op=nft_register_chain pid=1993 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 10 00:59:47.887000 audit[1993]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff8b670820 a2=0 a3=7fff8b67080c items=0 ppid=1851 pid=1993 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:59:47.887000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Jul 10 00:59:47.889000 audit[1995]: NETFILTER_CFG table=filter:61 family=10 entries=1 op=nft_register_rule pid=1995 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 10 00:59:47.889000 audit[1995]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7fff927288b0 a2=0 a3=7fff9272889c items=0 ppid=1851 pid=1995 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:59:47.889000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Jul 10 00:59:47.891000 audit[1998]: NETFILTER_CFG table=filter:62 family=10 entries=1 op=nft_register_rule pid=1998 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 10 00:59:47.891000 audit[1998]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffea58ad780 a2=0 a3=7ffea58ad76c items=0 ppid=1851 pid=1998 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:59:47.891000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Jul 10 00:59:47.893000 audit[2000]: NETFILTER_CFG table=filter:63 family=10 entries=3 op=nft_register_rule pid=2000 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Jul 10 00:59:47.893000 audit[2000]: SYSCALL arch=c000003e syscall=46 success=yes exit=2088 a0=3 a1=7ffc372234f0 a2=0 a3=7ffc372234dc items=0 ppid=1851 pid=2000 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:59:47.893000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 10 00:59:47.894000 audit[2000]: NETFILTER_CFG table=nat:64 family=10 entries=7 op=nft_register_chain pid=2000 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Jul 10 00:59:47.894000 audit[2000]: SYSCALL arch=c000003e syscall=46 success=yes exit=2056 a0=3 a1=7ffc372234f0 a2=0 a3=7ffc372234dc items=0 ppid=1851 pid=2000 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:59:47.894000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 10 00:59:48.065400 kubelet[1620]: E0710 00:59:48.065267 1620 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 00:59:48.274800 kubelet[1620]: I0710 00:59:48.274742 1620 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-proxy-cjdk9" podStartSLOduration=3.360211123 podStartE2EDuration="6.274730731s" podCreationTimestamp="2025-07-10 00:59:42 +0000 UTC" firstStartedPulling="2025-07-10 00:59:44.556590119 +0000 UTC m=+4.176333812" lastFinishedPulling="2025-07-10 00:59:47.471109722 +0000 UTC m=+7.090853420" observedRunningTime="2025-07-10 00:59:48.274187844 +0000 UTC m=+7.893931542" watchObservedRunningTime="2025-07-10 00:59:48.274730731 +0000 UTC m=+7.894474433" Jul 10 00:59:49.065675 kubelet[1620]: E0710 00:59:49.065643 1620 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 00:59:49.173418 kubelet[1620]: E0710 00:59:49.173382 1620 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-bfm74" podUID="f8539811-5553-42c4-b972-5bfd95d2de66" Jul 10 00:59:50.066755 kubelet[1620]: E0710 00:59:50.066729 1620 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 00:59:50.646561 env[1286]: time="2025-07-10T00:59:50.646532444Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.30.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 10 00:59:50.650459 env[1286]: time="2025-07-10T00:59:50.650434222Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:77a357d0d33e3016e61153f7d2b7de72371579c4aaeb767fb7ef0af606fe1630,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 10 00:59:50.651639 env[1286]: time="2025-07-10T00:59:50.651623077Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.30.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 10 00:59:50.653454 env[1286]: time="2025-07-10T00:59:50.653433554Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:50686775cc60acb78bd92a66fa2d84e1700b2d8e43a718fbadbf35e59baefb4d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 10 00:59:50.654074 env[1286]: time="2025-07-10T00:59:50.653984735Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.30.2\" returns image reference \"sha256:77a357d0d33e3016e61153f7d2b7de72371579c4aaeb767fb7ef0af606fe1630\"" Jul 10 00:59:50.656027 env[1286]: time="2025-07-10T00:59:50.655995878Z" level=info msg="CreateContainer within sandbox \"af1b55622ef1260faf116a0f7cacf2b525b3832b306c27a1e449fdb079178e7b\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Jul 10 00:59:50.665612 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1867510275.mount: Deactivated successfully. Jul 10 00:59:50.673270 env[1286]: time="2025-07-10T00:59:50.673238481Z" level=info msg="CreateContainer within sandbox \"af1b55622ef1260faf116a0f7cacf2b525b3832b306c27a1e449fdb079178e7b\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"0a98d7d52fb1776ede628420592175b82bef98c13dbe694f4a6dca515437db02\"" Jul 10 00:59:50.673762 env[1286]: time="2025-07-10T00:59:50.673738489Z" level=info msg="StartContainer for \"0a98d7d52fb1776ede628420592175b82bef98c13dbe694f4a6dca515437db02\"" Jul 10 00:59:50.688562 systemd[1]: Started cri-containerd-0a98d7d52fb1776ede628420592175b82bef98c13dbe694f4a6dca515437db02.scope. Jul 10 00:59:50.707895 kernel: kauditd_printk_skb: 348 callbacks suppressed Jul 10 00:59:50.707989 kernel: audit: type=1400 audit(1752109190.699:522): avc: denied { perfmon } for pid=2009 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:50.708007 kernel: audit: type=1300 audit(1752109190.699:522): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f28dc04acc8 items=0 ppid=1700 pid=2009 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:59:50.699000 audit[2009]: AVC avc: denied { perfmon } for pid=2009 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:50.699000 audit[2009]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f28dc04acc8 items=0 ppid=1700 pid=2009 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:59:50.711498 kernel: audit: type=1327 audit(1752109190.699:522): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3061393864376435326662313737366564653632383432303539323137 Jul 10 00:59:50.699000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3061393864376435326662313737366564653632383432303539323137 Jul 10 00:59:50.699000 audit[2009]: AVC avc: denied { bpf } for pid=2009 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:50.714203 kernel: audit: type=1400 audit(1752109190.699:523): avc: denied { bpf } for pid=2009 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:50.699000 audit[2009]: AVC avc: denied { bpf } for pid=2009 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:50.719327 kernel: audit: type=1400 audit(1752109190.699:523): avc: denied { bpf } for pid=2009 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:50.719376 kernel: audit: type=1400 audit(1752109190.699:523): avc: denied { bpf } for pid=2009 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:50.699000 audit[2009]: AVC avc: denied { bpf } for pid=2009 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:50.719485 kernel: audit: type=1400 audit(1752109190.699:523): avc: denied { perfmon } for pid=2009 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:50.699000 audit[2009]: AVC avc: denied { perfmon } for pid=2009 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:50.699000 audit[2009]: AVC avc: denied { perfmon } for pid=2009 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:50.724730 kernel: audit: type=1400 audit(1752109190.699:523): avc: denied { perfmon } for pid=2009 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:50.699000 audit[2009]: AVC avc: denied { perfmon } for pid=2009 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:50.727504 kernel: audit: type=1400 audit(1752109190.699:523): avc: denied { perfmon } for pid=2009 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:50.728429 kernel: audit: type=1400 audit(1752109190.699:523): avc: denied { perfmon } for pid=2009 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:50.699000 audit[2009]: AVC avc: denied { perfmon } for pid=2009 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:50.699000 audit[2009]: AVC avc: denied { perfmon } for pid=2009 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:50.699000 audit[2009]: AVC avc: denied { bpf } for pid=2009 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:50.699000 audit[2009]: AVC avc: denied { bpf } for pid=2009 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:50.699000 audit: BPF prog-id=72 op=LOAD Jul 10 00:59:50.699000 audit[2009]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c000305a68 items=0 ppid=1700 pid=2009 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:59:50.699000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3061393864376435326662313737366564653632383432303539323137 Jul 10 00:59:50.701000 audit[2009]: AVC avc: denied { bpf } for pid=2009 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:50.701000 audit[2009]: AVC avc: denied { bpf } for pid=2009 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:50.701000 audit[2009]: AVC avc: denied { perfmon } for pid=2009 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:50.701000 audit[2009]: AVC avc: denied { perfmon } for pid=2009 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:50.701000 audit[2009]: AVC avc: denied { perfmon } for pid=2009 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:50.701000 audit[2009]: AVC avc: denied { perfmon } for pid=2009 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:50.701000 audit[2009]: AVC avc: denied { perfmon } for pid=2009 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:50.701000 audit[2009]: AVC avc: denied { bpf } for pid=2009 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:50.701000 audit[2009]: AVC avc: denied { bpf } for pid=2009 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:50.701000 audit: BPF prog-id=73 op=LOAD Jul 10 00:59:50.701000 audit[2009]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c000305ab8 items=0 ppid=1700 pid=2009 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:59:50.701000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3061393864376435326662313737366564653632383432303539323137 Jul 10 00:59:50.703000 audit: BPF prog-id=73 op=UNLOAD Jul 10 00:59:50.703000 audit: BPF prog-id=72 op=UNLOAD Jul 10 00:59:50.703000 audit[2009]: AVC avc: denied { bpf } for pid=2009 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:50.703000 audit[2009]: AVC avc: denied { bpf } for pid=2009 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:50.703000 audit[2009]: AVC avc: denied { bpf } for pid=2009 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:50.703000 audit[2009]: AVC avc: denied { perfmon } for pid=2009 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:50.703000 audit[2009]: AVC avc: denied { perfmon } for pid=2009 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:50.703000 audit[2009]: AVC avc: denied { perfmon } for pid=2009 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:50.703000 audit[2009]: AVC avc: denied { perfmon } for pid=2009 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:50.703000 audit[2009]: AVC avc: denied { perfmon } for pid=2009 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:50.703000 audit[2009]: AVC avc: denied { bpf } for pid=2009 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:50.703000 audit[2009]: AVC avc: denied { bpf } for pid=2009 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:50.703000 audit: BPF prog-id=74 op=LOAD Jul 10 00:59:50.703000 audit[2009]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c000305b48 items=0 ppid=1700 pid=2009 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:59:50.703000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3061393864376435326662313737366564653632383432303539323137 Jul 10 00:59:50.741322 env[1286]: time="2025-07-10T00:59:50.741296076Z" level=info msg="StartContainer for \"0a98d7d52fb1776ede628420592175b82bef98c13dbe694f4a6dca515437db02\" returns successfully" Jul 10 00:59:51.068720 kubelet[1620]: E0710 00:59:51.067575 1620 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 00:59:51.173614 kubelet[1620]: E0710 00:59:51.173007 1620 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-bfm74" podUID="f8539811-5553-42c4-b972-5bfd95d2de66" Jul 10 00:59:51.664717 systemd[1]: run-containerd-runc-k8s.io-0a98d7d52fb1776ede628420592175b82bef98c13dbe694f4a6dca515437db02-runc.i0YaIR.mount: Deactivated successfully. Jul 10 00:59:52.068518 kubelet[1620]: E0710 00:59:52.068445 1620 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 00:59:52.674367 env[1286]: time="2025-07-10T00:59:52.674267796Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Jul 10 00:59:52.676591 systemd[1]: cri-containerd-0a98d7d52fb1776ede628420592175b82bef98c13dbe694f4a6dca515437db02.scope: Deactivated successfully. Jul 10 00:59:52.679000 audit: BPF prog-id=74 op=UNLOAD Jul 10 00:59:52.692014 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-0a98d7d52fb1776ede628420592175b82bef98c13dbe694f4a6dca515437db02-rootfs.mount: Deactivated successfully. Jul 10 00:59:52.716546 kubelet[1620]: I0710 00:59:52.716334 1620 kubelet_node_status.go:501] "Fast updating node status as it just became ready" Jul 10 00:59:53.069331 kubelet[1620]: E0710 00:59:53.069075 1620 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 00:59:53.133096 env[1286]: time="2025-07-10T00:59:53.133037485Z" level=info msg="shim disconnected" id=0a98d7d52fb1776ede628420592175b82bef98c13dbe694f4a6dca515437db02 Jul 10 00:59:53.133225 env[1286]: time="2025-07-10T00:59:53.133102812Z" level=warning msg="cleaning up after shim disconnected" id=0a98d7d52fb1776ede628420592175b82bef98c13dbe694f4a6dca515437db02 namespace=k8s.io Jul 10 00:59:53.133225 env[1286]: time="2025-07-10T00:59:53.133113013Z" level=info msg="cleaning up dead shim" Jul 10 00:59:53.139112 env[1286]: time="2025-07-10T00:59:53.139074804Z" level=warning msg="cleanup warnings time=\"2025-07-10T00:59:53Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2049 runtime=io.containerd.runc.v2\n" Jul 10 00:59:53.179681 systemd[1]: Created slice kubepods-besteffort-podf8539811_5553_42c4_b972_5bfd95d2de66.slice. Jul 10 00:59:53.182078 env[1286]: time="2025-07-10T00:59:53.182054768Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-bfm74,Uid:f8539811-5553-42c4-b972-5bfd95d2de66,Namespace:calico-system,Attempt:0,}" Jul 10 00:59:53.194325 env[1286]: time="2025-07-10T00:59:53.194265291Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.30.2\"" Jul 10 00:59:53.228986 env[1286]: time="2025-07-10T00:59:53.228936738Z" level=error msg="Failed to destroy network for sandbox \"34764dfbe2bcfa7c27deac9036fcf32920e6740c56f3a4e57f377c66f514490b\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 10 00:59:53.230059 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-34764dfbe2bcfa7c27deac9036fcf32920e6740c56f3a4e57f377c66f514490b-shm.mount: Deactivated successfully. Jul 10 00:59:53.230320 env[1286]: time="2025-07-10T00:59:53.230300928Z" level=error msg="encountered an error cleaning up failed sandbox \"34764dfbe2bcfa7c27deac9036fcf32920e6740c56f3a4e57f377c66f514490b\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 10 00:59:53.230397 env[1286]: time="2025-07-10T00:59:53.230380325Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-bfm74,Uid:f8539811-5553-42c4-b972-5bfd95d2de66,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"34764dfbe2bcfa7c27deac9036fcf32920e6740c56f3a4e57f377c66f514490b\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 10 00:59:53.230834 kubelet[1620]: E0710 00:59:53.230590 1620 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"34764dfbe2bcfa7c27deac9036fcf32920e6740c56f3a4e57f377c66f514490b\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 10 00:59:53.230834 kubelet[1620]: E0710 00:59:53.230637 1620 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"34764dfbe2bcfa7c27deac9036fcf32920e6740c56f3a4e57f377c66f514490b\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-bfm74" Jul 10 00:59:53.230834 kubelet[1620]: E0710 00:59:53.230656 1620 kuberuntime_manager.go:1237] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"34764dfbe2bcfa7c27deac9036fcf32920e6740c56f3a4e57f377c66f514490b\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-bfm74" Jul 10 00:59:53.230927 kubelet[1620]: E0710 00:59:53.230685 1620 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-bfm74_calico-system(f8539811-5553-42c4-b972-5bfd95d2de66)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-bfm74_calico-system(f8539811-5553-42c4-b972-5bfd95d2de66)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"34764dfbe2bcfa7c27deac9036fcf32920e6740c56f3a4e57f377c66f514490b\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-bfm74" podUID="f8539811-5553-42c4-b972-5bfd95d2de66" Jul 10 00:59:53.447509 update_engine[1258]: I0710 00:59:53.447463 1258 update_attempter.cc:509] Updating boot flags... Jul 10 00:59:54.069706 kubelet[1620]: E0710 00:59:54.069660 1620 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 00:59:54.196026 kubelet[1620]: I0710 00:59:54.195962 1620 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="34764dfbe2bcfa7c27deac9036fcf32920e6740c56f3a4e57f377c66f514490b" Jul 10 00:59:54.196655 env[1286]: time="2025-07-10T00:59:54.196630036Z" level=info msg="StopPodSandbox for \"34764dfbe2bcfa7c27deac9036fcf32920e6740c56f3a4e57f377c66f514490b\"" Jul 10 00:59:54.215547 env[1286]: time="2025-07-10T00:59:54.215509884Z" level=error msg="StopPodSandbox for \"34764dfbe2bcfa7c27deac9036fcf32920e6740c56f3a4e57f377c66f514490b\" failed" error="failed to destroy network for sandbox \"34764dfbe2bcfa7c27deac9036fcf32920e6740c56f3a4e57f377c66f514490b\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 10 00:59:54.215852 kubelet[1620]: E0710 00:59:54.215815 1620 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"34764dfbe2bcfa7c27deac9036fcf32920e6740c56f3a4e57f377c66f514490b\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="34764dfbe2bcfa7c27deac9036fcf32920e6740c56f3a4e57f377c66f514490b" Jul 10 00:59:54.215922 kubelet[1620]: E0710 00:59:54.215873 1620 kuberuntime_manager.go:1546] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"34764dfbe2bcfa7c27deac9036fcf32920e6740c56f3a4e57f377c66f514490b"} Jul 10 00:59:54.215953 kubelet[1620]: E0710 00:59:54.215939 1620 kuberuntime_manager.go:1146] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"f8539811-5553-42c4-b972-5bfd95d2de66\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"34764dfbe2bcfa7c27deac9036fcf32920e6740c56f3a4e57f377c66f514490b\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Jul 10 00:59:54.216009 kubelet[1620]: E0710 00:59:54.215972 1620 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"f8539811-5553-42c4-b972-5bfd95d2de66\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"34764dfbe2bcfa7c27deac9036fcf32920e6740c56f3a4e57f377c66f514490b\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-bfm74" podUID="f8539811-5553-42c4-b972-5bfd95d2de66" Jul 10 00:59:55.070788 kubelet[1620]: E0710 00:59:55.070754 1620 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 00:59:56.071564 kubelet[1620]: E0710 00:59:56.071540 1620 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 00:59:57.072467 kubelet[1620]: E0710 00:59:57.072431 1620 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 00:59:58.073138 kubelet[1620]: E0710 00:59:58.073104 1620 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 00:59:58.772587 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount260129674.mount: Deactivated successfully. Jul 10 00:59:58.904239 env[1286]: time="2025-07-10T00:59:58.904189966Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.30.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 10 00:59:58.920104 env[1286]: time="2025-07-10T00:59:58.920069196Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:cc52550d767f73458fee2ee68db9db5de30d175e8fa4569ebdb43610127b6d20,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 10 00:59:58.928060 env[1286]: time="2025-07-10T00:59:58.928040043Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.30.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 10 00:59:58.937940 env[1286]: time="2025-07-10T00:59:58.937916070Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:e94d49349cc361ef2216d27dda4a097278984d778279f66e79b0616c827c6760,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 10 00:59:58.938283 env[1286]: time="2025-07-10T00:59:58.938264438Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.30.2\" returns image reference \"sha256:cc52550d767f73458fee2ee68db9db5de30d175e8fa4569ebdb43610127b6d20\"" Jul 10 00:59:59.007511 env[1286]: time="2025-07-10T00:59:59.007484837Z" level=info msg="CreateContainer within sandbox \"af1b55622ef1260faf116a0f7cacf2b525b3832b306c27a1e449fdb079178e7b\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Jul 10 00:59:59.019835 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2953730314.mount: Deactivated successfully. Jul 10 00:59:59.025691 env[1286]: time="2025-07-10T00:59:59.025389698Z" level=info msg="CreateContainer within sandbox \"af1b55622ef1260faf116a0f7cacf2b525b3832b306c27a1e449fdb079178e7b\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"4627b58e82075f31fee1a01ca11701b9cec5ea1b58922d10114e451441294b1d\"" Jul 10 00:59:59.025984 env[1286]: time="2025-07-10T00:59:59.025952812Z" level=info msg="StartContainer for \"4627b58e82075f31fee1a01ca11701b9cec5ea1b58922d10114e451441294b1d\"" Jul 10 00:59:59.040576 systemd[1]: Started cri-containerd-4627b58e82075f31fee1a01ca11701b9cec5ea1b58922d10114e451441294b1d.scope. Jul 10 00:59:59.070553 kernel: kauditd_printk_skb: 34 callbacks suppressed Jul 10 00:59:59.070639 kernel: audit: type=1400 audit(1752109199.058:529): avc: denied { perfmon } for pid=2132 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:59.070664 kernel: audit: type=1300 audit(1752109199.058:529): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=7f7d75fc6478 items=0 ppid=1700 pid=2132 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:59:59.070756 kernel: audit: type=1327 audit(1752109199.058:529): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3436323762353865383230373566333166656531613031636131313730 Jul 10 00:59:59.058000 audit[2132]: AVC avc: denied { perfmon } for pid=2132 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:59.058000 audit[2132]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=7f7d75fc6478 items=0 ppid=1700 pid=2132 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:59:59.058000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3436323762353865383230373566333166656531613031636131313730 Jul 10 00:59:59.060000 audit[2132]: AVC avc: denied { bpf } for pid=2132 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:59.073634 kernel: audit: type=1400 audit(1752109199.060:530): avc: denied { bpf } for pid=2132 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:59.073773 kubelet[1620]: E0710 00:59:59.073683 1620 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 00:59:59.060000 audit[2132]: AVC avc: denied { bpf } for pid=2132 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:59.076368 kernel: audit: type=1400 audit(1752109199.060:530): avc: denied { bpf } for pid=2132 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:59.060000 audit[2132]: AVC avc: denied { bpf } for pid=2132 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:59.079465 kernel: audit: type=1400 audit(1752109199.060:530): avc: denied { bpf } for pid=2132 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:59.060000 audit[2132]: AVC avc: denied { perfmon } for pid=2132 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:59.083443 kernel: audit: type=1400 audit(1752109199.060:530): avc: denied { perfmon } for pid=2132 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:59.083505 kernel: audit: type=1400 audit(1752109199.060:530): avc: denied { perfmon } for pid=2132 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:59.060000 audit[2132]: AVC avc: denied { perfmon } for pid=2132 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:59.088767 kernel: audit: type=1400 audit(1752109199.060:530): avc: denied { perfmon } for pid=2132 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:59.088804 kernel: audit: type=1400 audit(1752109199.060:530): avc: denied { perfmon } for pid=2132 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:59.060000 audit[2132]: AVC avc: denied { perfmon } for pid=2132 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:59.060000 audit[2132]: AVC avc: denied { perfmon } for pid=2132 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:59.060000 audit[2132]: AVC avc: denied { perfmon } for pid=2132 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:59.060000 audit[2132]: AVC avc: denied { bpf } for pid=2132 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:59.060000 audit[2132]: AVC avc: denied { bpf } for pid=2132 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:59.060000 audit: BPF prog-id=75 op=LOAD Jul 10 00:59:59.060000 audit[2132]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bd9d8 a2=78 a3=c00028e9c8 items=0 ppid=1700 pid=2132 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:59:59.060000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3436323762353865383230373566333166656531613031636131313730 Jul 10 00:59:59.065000 audit[2132]: AVC avc: denied { bpf } for pid=2132 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:59.065000 audit[2132]: AVC avc: denied { bpf } for pid=2132 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:59.065000 audit[2132]: AVC avc: denied { perfmon } for pid=2132 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:59.065000 audit[2132]: AVC avc: denied { perfmon } for pid=2132 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:59.065000 audit[2132]: AVC avc: denied { perfmon } for pid=2132 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:59.065000 audit[2132]: AVC avc: denied { perfmon } for pid=2132 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:59.065000 audit[2132]: AVC avc: denied { perfmon } for pid=2132 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:59.065000 audit[2132]: AVC avc: denied { bpf } for pid=2132 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:59.065000 audit[2132]: AVC avc: denied { bpf } for pid=2132 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:59.065000 audit: BPF prog-id=76 op=LOAD Jul 10 00:59:59.065000 audit[2132]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bd770 a2=78 a3=c00028ea18 items=0 ppid=1700 pid=2132 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:59:59.065000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3436323762353865383230373566333166656531613031636131313730 Jul 10 00:59:59.069000 audit: BPF prog-id=76 op=UNLOAD Jul 10 00:59:59.069000 audit: BPF prog-id=75 op=UNLOAD Jul 10 00:59:59.069000 audit[2132]: AVC avc: denied { bpf } for pid=2132 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:59.069000 audit[2132]: AVC avc: denied { bpf } for pid=2132 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:59.069000 audit[2132]: AVC avc: denied { bpf } for pid=2132 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:59.069000 audit[2132]: AVC avc: denied { perfmon } for pid=2132 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:59.069000 audit[2132]: AVC avc: denied { perfmon } for pid=2132 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:59.069000 audit[2132]: AVC avc: denied { perfmon } for pid=2132 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:59.069000 audit[2132]: AVC avc: denied { perfmon } for pid=2132 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:59.069000 audit[2132]: AVC avc: denied { perfmon } for pid=2132 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:59.069000 audit[2132]: AVC avc: denied { bpf } for pid=2132 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:59.069000 audit[2132]: AVC avc: denied { bpf } for pid=2132 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:59.069000 audit: BPF prog-id=77 op=LOAD Jul 10 00:59:59.069000 audit[2132]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bdc30 a2=78 a3=c00028eaa8 items=0 ppid=1700 pid=2132 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:59:59.069000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3436323762353865383230373566333166656531613031636131313730 Jul 10 00:59:59.160177 env[1286]: time="2025-07-10T00:59:59.160146402Z" level=info msg="StartContainer for \"4627b58e82075f31fee1a01ca11701b9cec5ea1b58922d10114e451441294b1d\" returns successfully" Jul 10 00:59:59.305769 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Jul 10 00:59:59.305850 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. Jul 10 00:59:59.946576 kubelet[1620]: I0710 00:59:59.946510 1620 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-node-pclwm" podStartSLOduration=3.562382957 podStartE2EDuration="17.946499317s" podCreationTimestamp="2025-07-10 00:59:42 +0000 UTC" firstStartedPulling="2025-07-10 00:59:44.554825343 +0000 UTC m=+4.174569034" lastFinishedPulling="2025-07-10 00:59:58.938941699 +0000 UTC m=+18.558685394" observedRunningTime="2025-07-10 00:59:59.942435564 +0000 UTC m=+19.562179259" watchObservedRunningTime="2025-07-10 00:59:59.946499317 +0000 UTC m=+19.566243019" Jul 10 01:00:00.074405 kubelet[1620]: E0710 01:00:00.074352 1620 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 01:00:00.218989 systemd[1]: run-containerd-runc-k8s.io-4627b58e82075f31fee1a01ca11701b9cec5ea1b58922d10114e451441294b1d-runc.he3JgT.mount: Deactivated successfully. Jul 10 01:00:01.052421 kubelet[1620]: E0710 01:00:01.052381 1620 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 01:00:01.075203 kubelet[1620]: E0710 01:00:01.075167 1620 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 01:00:01.419000 audit[2272]: AVC avc: denied { write } for pid=2272 comm="tee" name="fd" dev="proc" ino=30844 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Jul 10 01:00:01.423000 audit[2277]: AVC avc: denied { write } for pid=2277 comm="tee" name="fd" dev="proc" ino=30854 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Jul 10 01:00:01.419000 audit[2272]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffeb1d747de a2=241 a3=1b6 items=1 ppid=2237 pid=2272 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 01:00:01.419000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Jul 10 01:00:01.419000 audit: PATH item=0 name="/dev/fd/63" inode=30834 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 01:00:01.419000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Jul 10 01:00:01.423000 audit[2277]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffceb0c57ed a2=241 a3=1b6 items=1 ppid=2238 pid=2277 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 01:00:01.423000 audit: CWD cwd="/etc/service/enabled/confd/log" Jul 10 01:00:01.423000 audit: PATH item=0 name="/dev/fd/63" inode=30839 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 01:00:01.423000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Jul 10 01:00:01.430000 audit[2292]: AVC avc: denied { write } for pid=2292 comm="tee" name="fd" dev="proc" ino=30862 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Jul 10 01:00:01.430000 audit[2292]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffcd84877dd a2=241 a3=1b6 items=1 ppid=2249 pid=2292 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 01:00:01.430000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Jul 10 01:00:01.430000 audit: PATH item=0 name="/dev/fd/63" inode=30847 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 01:00:01.430000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Jul 10 01:00:01.450000 audit[2288]: AVC avc: denied { write } for pid=2288 comm="tee" name="fd" dev="proc" ino=29976 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Jul 10 01:00:01.450000 audit[2288]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff68af87ee a2=241 a3=1b6 items=1 ppid=2246 pid=2288 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 01:00:01.450000 audit: CWD cwd="/etc/service/enabled/bird/log" Jul 10 01:00:01.450000 audit: PATH item=0 name="/dev/fd/63" inode=29968 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 01:00:01.450000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Jul 10 01:00:01.453000 audit[2297]: AVC avc: denied { write } for pid=2297 comm="tee" name="fd" dev="proc" ino=29986 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Jul 10 01:00:01.453000 audit[2297]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff1958b7ef a2=241 a3=1b6 items=1 ppid=2241 pid=2297 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 01:00:01.453000 audit: CWD cwd="/etc/service/enabled/cni/log" Jul 10 01:00:01.453000 audit: PATH item=0 name="/dev/fd/63" inode=29970 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 01:00:01.453000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Jul 10 01:00:01.461000 audit[2312]: AVC avc: denied { write } for pid=2312 comm="tee" name="fd" dev="proc" ino=29992 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Jul 10 01:00:01.461000 audit[2312]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffce2f717ed a2=241 a3=1b6 items=1 ppid=2242 pid=2312 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 01:00:01.461000 audit: CWD cwd="/etc/service/enabled/bird6/log" Jul 10 01:00:01.461000 audit: PATH item=0 name="/dev/fd/63" inode=29983 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 01:00:01.461000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Jul 10 01:00:01.462000 audit[2310]: AVC avc: denied { write } for pid=2310 comm="tee" name="fd" dev="proc" ino=29994 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Jul 10 01:00:01.462000 audit[2310]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffce05947ed a2=241 a3=1b6 items=1 ppid=2248 pid=2310 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 01:00:01.462000 audit: CWD cwd="/etc/service/enabled/felix/log" Jul 10 01:00:01.462000 audit: PATH item=0 name="/dev/fd/63" inode=29980 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 01:00:01.462000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Jul 10 01:00:01.807000 audit[2325]: AVC avc: denied { bpf } for pid=2325 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:01.807000 audit[2325]: AVC avc: denied { bpf } for pid=2325 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:01.807000 audit[2325]: AVC avc: denied { perfmon } for pid=2325 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:01.807000 audit[2325]: AVC avc: denied { perfmon } for pid=2325 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:01.807000 audit[2325]: AVC avc: denied { perfmon } for pid=2325 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:01.807000 audit[2325]: AVC avc: denied { perfmon } for pid=2325 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:01.807000 audit[2325]: AVC avc: denied { perfmon } for pid=2325 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:01.807000 audit[2325]: AVC avc: denied { bpf } for pid=2325 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:01.807000 audit[2325]: AVC avc: denied { bpf } for pid=2325 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:01.807000 audit: BPF prog-id=78 op=LOAD Jul 10 01:00:01.807000 audit[2325]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffd44550b80 a2=98 a3=1fffffffffffffff items=0 ppid=2255 pid=2325 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 01:00:01.807000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F74632F676C6F62616C732F63616C695F63746C625F70726F677300747970650070726F675F6172726179006B657900340076616C7565003400656E74726965730033006E616D650063616C695F63746C625F70726F677300666C6167730030 Jul 10 01:00:01.807000 audit: BPF prog-id=78 op=UNLOAD Jul 10 01:00:01.807000 audit[2325]: AVC avc: denied { bpf } for pid=2325 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:01.807000 audit[2325]: AVC avc: denied { bpf } for pid=2325 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:01.807000 audit[2325]: AVC avc: denied { perfmon } for pid=2325 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:01.807000 audit[2325]: AVC avc: denied { perfmon } for pid=2325 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:01.807000 audit[2325]: AVC avc: denied { perfmon } for pid=2325 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:01.807000 audit[2325]: AVC avc: denied { perfmon } for pid=2325 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:01.807000 audit[2325]: AVC avc: denied { perfmon } for pid=2325 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:01.807000 audit[2325]: AVC avc: denied { bpf } for pid=2325 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:01.807000 audit[2325]: AVC avc: denied { bpf } for pid=2325 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:01.807000 audit: BPF prog-id=79 op=LOAD Jul 10 01:00:01.807000 audit[2325]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffd44550a60 a2=94 a3=3 items=0 ppid=2255 pid=2325 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 01:00:01.807000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F74632F676C6F62616C732F63616C695F63746C625F70726F677300747970650070726F675F6172726179006B657900340076616C7565003400656E74726965730033006E616D650063616C695F63746C625F70726F677300666C6167730030 Jul 10 01:00:01.807000 audit: BPF prog-id=79 op=UNLOAD Jul 10 01:00:01.807000 audit[2325]: AVC avc: denied { bpf } for pid=2325 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:01.807000 audit[2325]: AVC avc: denied { bpf } for pid=2325 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:01.807000 audit[2325]: AVC avc: denied { perfmon } for pid=2325 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:01.807000 audit[2325]: AVC avc: denied { perfmon } for pid=2325 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:01.807000 audit[2325]: AVC avc: denied { perfmon } for pid=2325 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:01.807000 audit[2325]: AVC avc: denied { perfmon } for pid=2325 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:01.807000 audit[2325]: AVC avc: denied { perfmon } for pid=2325 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:01.807000 audit[2325]: AVC avc: denied { bpf } for pid=2325 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:01.807000 audit[2325]: AVC avc: denied { bpf } for pid=2325 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:01.807000 audit: BPF prog-id=80 op=LOAD Jul 10 01:00:01.807000 audit[2325]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffd44550aa0 a2=94 a3=7ffd44550c80 items=0 ppid=2255 pid=2325 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 01:00:01.807000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F74632F676C6F62616C732F63616C695F63746C625F70726F677300747970650070726F675F6172726179006B657900340076616C7565003400656E74726965730033006E616D650063616C695F63746C625F70726F677300666C6167730030 Jul 10 01:00:01.807000 audit: BPF prog-id=80 op=UNLOAD Jul 10 01:00:01.807000 audit[2325]: AVC avc: denied { perfmon } for pid=2325 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:01.807000 audit[2325]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=0 a1=7ffd44550b70 a2=50 a3=a000000085 items=0 ppid=2255 pid=2325 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 01:00:01.807000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F74632F676C6F62616C732F63616C695F63746C625F70726F677300747970650070726F675F6172726179006B657900340076616C7565003400656E74726965730033006E616D650063616C695F63746C625F70726F677300666C6167730030 Jul 10 01:00:01.809000 audit[2326]: AVC avc: denied { bpf } for pid=2326 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:01.809000 audit[2326]: AVC avc: denied { bpf } for pid=2326 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:01.809000 audit[2326]: AVC avc: denied { perfmon } for pid=2326 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:01.809000 audit[2326]: AVC avc: denied { perfmon } for pid=2326 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:01.809000 audit[2326]: AVC avc: denied { perfmon } for pid=2326 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:01.809000 audit[2326]: AVC avc: denied { perfmon } for pid=2326 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:01.809000 audit[2326]: AVC avc: denied { perfmon } for pid=2326 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:01.809000 audit[2326]: AVC avc: denied { bpf } for pid=2326 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:01.809000 audit[2326]: AVC avc: denied { bpf } for pid=2326 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:01.809000 audit: BPF prog-id=81 op=LOAD Jul 10 01:00:01.809000 audit[2326]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffd8e5b6340 a2=98 a3=3 items=0 ppid=2255 pid=2326 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 01:00:01.809000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Jul 10 01:00:01.810000 audit: BPF prog-id=81 op=UNLOAD Jul 10 01:00:01.810000 audit[2326]: AVC avc: denied { bpf } for pid=2326 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:01.810000 audit[2326]: AVC avc: denied { bpf } for pid=2326 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:01.810000 audit[2326]: AVC avc: denied { perfmon } for pid=2326 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:01.810000 audit[2326]: AVC avc: denied { perfmon } for pid=2326 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:01.810000 audit[2326]: AVC avc: denied { perfmon } for pid=2326 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:01.810000 audit[2326]: AVC avc: denied { perfmon } for pid=2326 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:01.810000 audit[2326]: AVC avc: denied { perfmon } for pid=2326 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:01.810000 audit[2326]: AVC avc: denied { bpf } for pid=2326 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:01.810000 audit[2326]: AVC avc: denied { bpf } for pid=2326 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:01.810000 audit: BPF prog-id=82 op=LOAD Jul 10 01:00:01.810000 audit[2326]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffd8e5b6130 a2=94 a3=54428f items=0 ppid=2255 pid=2326 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 01:00:01.810000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Jul 10 01:00:01.810000 audit: BPF prog-id=82 op=UNLOAD Jul 10 01:00:01.811000 audit[2326]: AVC avc: denied { bpf } for pid=2326 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:01.811000 audit[2326]: AVC avc: denied { bpf } for pid=2326 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:01.811000 audit[2326]: AVC avc: denied { perfmon } for pid=2326 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:01.811000 audit[2326]: AVC avc: denied { perfmon } for pid=2326 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:01.811000 audit[2326]: AVC avc: denied { perfmon } for pid=2326 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:01.811000 audit[2326]: AVC avc: denied { perfmon } for pid=2326 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:01.811000 audit[2326]: AVC avc: denied { perfmon } for pid=2326 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:01.811000 audit[2326]: AVC avc: denied { bpf } for pid=2326 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:01.811000 audit[2326]: AVC avc: denied { bpf } for pid=2326 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:01.811000 audit: BPF prog-id=83 op=LOAD Jul 10 01:00:01.811000 audit[2326]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffd8e5b6160 a2=94 a3=2 items=0 ppid=2255 pid=2326 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 01:00:01.811000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Jul 10 01:00:01.811000 audit: BPF prog-id=83 op=UNLOAD Jul 10 01:00:01.881000 audit[2326]: AVC avc: denied { bpf } for pid=2326 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:01.881000 audit[2326]: AVC avc: denied { bpf } for pid=2326 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:01.881000 audit[2326]: AVC avc: denied { perfmon } for pid=2326 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:01.881000 audit[2326]: AVC avc: denied { perfmon } for pid=2326 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:01.881000 audit[2326]: AVC avc: denied { perfmon } for pid=2326 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:01.881000 audit[2326]: AVC avc: denied { perfmon } for pid=2326 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:01.881000 audit[2326]: AVC avc: denied { perfmon } for pid=2326 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:01.881000 audit[2326]: AVC avc: denied { bpf } for pid=2326 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:01.881000 audit[2326]: AVC avc: denied { bpf } for pid=2326 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:01.881000 audit: BPF prog-id=84 op=LOAD Jul 10 01:00:01.881000 audit[2326]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffd8e5b6020 a2=94 a3=1 items=0 ppid=2255 pid=2326 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 01:00:01.881000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Jul 10 01:00:01.881000 audit: BPF prog-id=84 op=UNLOAD Jul 10 01:00:01.881000 audit[2326]: AVC avc: denied { perfmon } for pid=2326 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:01.881000 audit[2326]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffd8e5b60f0 a2=50 a3=7ffd8e5b61d0 items=0 ppid=2255 pid=2326 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 01:00:01.881000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Jul 10 01:00:01.891000 audit[2326]: AVC avc: denied { bpf } for pid=2326 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:01.891000 audit[2326]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd8e5b6030 a2=28 a3=0 items=0 ppid=2255 pid=2326 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 01:00:01.891000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Jul 10 01:00:01.891000 audit[2326]: AVC avc: denied { bpf } for pid=2326 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:01.891000 audit[2326]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd8e5b6060 a2=28 a3=0 items=0 ppid=2255 pid=2326 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 01:00:01.891000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Jul 10 01:00:01.891000 audit[2326]: AVC avc: denied { bpf } for pid=2326 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:01.891000 audit[2326]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd8e5b5f70 a2=28 a3=0 items=0 ppid=2255 pid=2326 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 01:00:01.891000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Jul 10 01:00:01.891000 audit[2326]: AVC avc: denied { bpf } for pid=2326 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:01.891000 audit[2326]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd8e5b6080 a2=28 a3=0 items=0 ppid=2255 pid=2326 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 01:00:01.891000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Jul 10 01:00:01.891000 audit[2326]: AVC avc: denied { bpf } for pid=2326 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:01.891000 audit[2326]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd8e5b6060 a2=28 a3=0 items=0 ppid=2255 pid=2326 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 01:00:01.891000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Jul 10 01:00:01.891000 audit[2326]: AVC avc: denied { bpf } for pid=2326 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:01.891000 audit[2326]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd8e5b6050 a2=28 a3=0 items=0 ppid=2255 pid=2326 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 01:00:01.891000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Jul 10 01:00:01.891000 audit[2326]: AVC avc: denied { bpf } for pid=2326 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:01.891000 audit[2326]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd8e5b6080 a2=28 a3=0 items=0 ppid=2255 pid=2326 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 01:00:01.891000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Jul 10 01:00:01.891000 audit[2326]: AVC avc: denied { bpf } for pid=2326 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:01.891000 audit[2326]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd8e5b6060 a2=28 a3=0 items=0 ppid=2255 pid=2326 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 01:00:01.891000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Jul 10 01:00:01.891000 audit[2326]: AVC avc: denied { bpf } for pid=2326 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:01.891000 audit[2326]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd8e5b6080 a2=28 a3=0 items=0 ppid=2255 pid=2326 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 01:00:01.891000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Jul 10 01:00:01.891000 audit[2326]: AVC avc: denied { bpf } for pid=2326 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:01.891000 audit[2326]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd8e5b6050 a2=28 a3=0 items=0 ppid=2255 pid=2326 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 01:00:01.891000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Jul 10 01:00:01.891000 audit[2326]: AVC avc: denied { bpf } for pid=2326 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:01.891000 audit[2326]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd8e5b60c0 a2=28 a3=0 items=0 ppid=2255 pid=2326 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 01:00:01.891000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Jul 10 01:00:01.891000 audit[2326]: AVC avc: denied { perfmon } for pid=2326 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:01.891000 audit[2326]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffd8e5b5e70 a2=50 a3=1 items=0 ppid=2255 pid=2326 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 01:00:01.891000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Jul 10 01:00:01.891000 audit[2326]: AVC avc: denied { bpf } for pid=2326 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:01.891000 audit[2326]: AVC avc: denied { bpf } for pid=2326 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:01.891000 audit[2326]: AVC avc: denied { perfmon } for pid=2326 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:01.891000 audit[2326]: AVC avc: denied { perfmon } for pid=2326 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:01.891000 audit[2326]: AVC avc: denied { perfmon } for pid=2326 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:01.891000 audit[2326]: AVC avc: denied { perfmon } for pid=2326 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:01.891000 audit[2326]: AVC avc: denied { perfmon } for pid=2326 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:01.891000 audit[2326]: AVC avc: denied { bpf } for pid=2326 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:01.891000 audit[2326]: AVC avc: denied { bpf } for pid=2326 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:01.891000 audit: BPF prog-id=85 op=LOAD Jul 10 01:00:01.891000 audit[2326]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffd8e5b5e70 a2=94 a3=5 items=0 ppid=2255 pid=2326 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 01:00:01.891000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Jul 10 01:00:01.891000 audit: BPF prog-id=85 op=UNLOAD Jul 10 01:00:01.891000 audit[2326]: AVC avc: denied { perfmon } for pid=2326 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:01.891000 audit[2326]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffd8e5b5f20 a2=50 a3=1 items=0 ppid=2255 pid=2326 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 01:00:01.891000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Jul 10 01:00:01.891000 audit[2326]: AVC avc: denied { bpf } for pid=2326 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:01.891000 audit[2326]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffd8e5b6040 a2=4 a3=38 items=0 ppid=2255 pid=2326 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 01:00:01.891000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Jul 10 01:00:01.891000 audit[2326]: AVC avc: denied { bpf } for pid=2326 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:01.891000 audit[2326]: AVC avc: denied { bpf } for pid=2326 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:01.891000 audit[2326]: AVC avc: denied { perfmon } for pid=2326 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:01.891000 audit[2326]: AVC avc: denied { bpf } for pid=2326 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:01.891000 audit[2326]: AVC avc: denied { perfmon } for pid=2326 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:01.891000 audit[2326]: AVC avc: denied { perfmon } for pid=2326 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:01.891000 audit[2326]: AVC avc: denied { perfmon } for pid=2326 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:01.891000 audit[2326]: AVC avc: denied { perfmon } for pid=2326 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:01.891000 audit[2326]: AVC avc: denied { perfmon } for pid=2326 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:01.891000 audit[2326]: AVC avc: denied { bpf } for pid=2326 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:01.891000 audit[2326]: AVC avc: denied { confidentiality } for pid=2326 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 01:00:01.891000 audit[2326]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffd8e5b6090 a2=94 a3=6 items=0 ppid=2255 pid=2326 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 01:00:01.891000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Jul 10 01:00:01.891000 audit[2326]: AVC avc: denied { bpf } for pid=2326 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:01.891000 audit[2326]: AVC avc: denied { bpf } for pid=2326 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:01.891000 audit[2326]: AVC avc: denied { perfmon } for pid=2326 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:01.891000 audit[2326]: AVC avc: denied { bpf } for pid=2326 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:01.891000 audit[2326]: AVC avc: denied { perfmon } for pid=2326 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:01.891000 audit[2326]: AVC avc: denied { perfmon } for pid=2326 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:01.891000 audit[2326]: AVC avc: denied { perfmon } for pid=2326 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:01.891000 audit[2326]: AVC avc: denied { perfmon } for pid=2326 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:01.891000 audit[2326]: AVC avc: denied { perfmon } for pid=2326 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:01.891000 audit[2326]: AVC avc: denied { bpf } for pid=2326 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:01.891000 audit[2326]: AVC avc: denied { confidentiality } for pid=2326 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 01:00:01.891000 audit[2326]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffd8e5b5840 a2=94 a3=88 items=0 ppid=2255 pid=2326 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 01:00:01.891000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Jul 10 01:00:01.891000 audit[2326]: AVC avc: denied { bpf } for pid=2326 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:01.891000 audit[2326]: AVC avc: denied { bpf } for pid=2326 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:01.891000 audit[2326]: AVC avc: denied { perfmon } for pid=2326 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:01.891000 audit[2326]: AVC avc: denied { bpf } for pid=2326 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:01.891000 audit[2326]: AVC avc: denied { perfmon } for pid=2326 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:01.891000 audit[2326]: AVC avc: denied { perfmon } for pid=2326 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:01.891000 audit[2326]: AVC avc: denied { perfmon } for pid=2326 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:01.891000 audit[2326]: AVC avc: denied { perfmon } for pid=2326 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:01.891000 audit[2326]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffd8e5b5840 a2=94 a3=88 items=0 ppid=2255 pid=2326 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 01:00:01.891000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Jul 10 01:00:01.897000 audit[2330]: AVC avc: denied { bpf } for pid=2330 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:01.897000 audit[2330]: AVC avc: denied { bpf } for pid=2330 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:01.897000 audit[2330]: AVC avc: denied { perfmon } for pid=2330 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:01.897000 audit[2330]: AVC avc: denied { perfmon } for pid=2330 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:01.897000 audit[2330]: AVC avc: denied { perfmon } for pid=2330 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:01.897000 audit[2330]: AVC avc: denied { perfmon } for pid=2330 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:01.897000 audit[2330]: AVC avc: denied { perfmon } for pid=2330 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:01.897000 audit[2330]: AVC avc: denied { bpf } for pid=2330 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:01.897000 audit[2330]: AVC avc: denied { bpf } for pid=2330 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:01.897000 audit: BPF prog-id=86 op=LOAD Jul 10 01:00:01.897000 audit[2330]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fff7c672f70 a2=98 a3=1999999999999999 items=0 ppid=2255 pid=2330 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 01:00:01.897000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Jul 10 01:00:01.897000 audit: BPF prog-id=86 op=UNLOAD Jul 10 01:00:01.897000 audit[2330]: AVC avc: denied { bpf } for pid=2330 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:01.897000 audit[2330]: AVC avc: denied { bpf } for pid=2330 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:01.897000 audit[2330]: AVC avc: denied { perfmon } for pid=2330 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:01.897000 audit[2330]: AVC avc: denied { perfmon } for pid=2330 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:01.897000 audit[2330]: AVC avc: denied { perfmon } for pid=2330 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:01.897000 audit[2330]: AVC avc: denied { perfmon } for pid=2330 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:01.897000 audit[2330]: AVC avc: denied { perfmon } for pid=2330 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:01.897000 audit[2330]: AVC avc: denied { bpf } for pid=2330 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:01.897000 audit[2330]: AVC avc: denied { bpf } for pid=2330 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:01.897000 audit: BPF prog-id=87 op=LOAD Jul 10 01:00:01.897000 audit[2330]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fff7c672e50 a2=94 a3=ffff items=0 ppid=2255 pid=2330 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 01:00:01.897000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Jul 10 01:00:01.897000 audit: BPF prog-id=87 op=UNLOAD Jul 10 01:00:01.897000 audit[2330]: AVC avc: denied { bpf } for pid=2330 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:01.897000 audit[2330]: AVC avc: denied { bpf } for pid=2330 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:01.897000 audit[2330]: AVC avc: denied { perfmon } for pid=2330 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:01.897000 audit[2330]: AVC avc: denied { perfmon } for pid=2330 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:01.897000 audit[2330]: AVC avc: denied { perfmon } for pid=2330 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:01.897000 audit[2330]: AVC avc: denied { perfmon } for pid=2330 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:01.897000 audit[2330]: AVC avc: denied { perfmon } for pid=2330 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:01.897000 audit[2330]: AVC avc: denied { bpf } for pid=2330 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:01.897000 audit[2330]: AVC avc: denied { bpf } for pid=2330 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:01.897000 audit: BPF prog-id=88 op=LOAD Jul 10 01:00:01.897000 audit[2330]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fff7c672e90 a2=94 a3=7fff7c673070 items=0 ppid=2255 pid=2330 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 01:00:01.897000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Jul 10 01:00:01.897000 audit: BPF prog-id=88 op=UNLOAD Jul 10 01:00:02.026719 systemd-networkd[1081]: vxlan.calico: Link UP Jul 10 01:00:02.026723 systemd-networkd[1081]: vxlan.calico: Gained carrier Jul 10 01:00:02.040000 audit[2376]: AVC avc: denied { bpf } for pid=2376 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:02.040000 audit[2376]: AVC avc: denied { bpf } for pid=2376 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:02.040000 audit[2376]: AVC avc: denied { perfmon } for pid=2376 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:02.040000 audit[2376]: AVC avc: denied { perfmon } for pid=2376 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:02.040000 audit[2376]: AVC avc: denied { perfmon } for pid=2376 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:02.040000 audit[2376]: AVC avc: denied { perfmon } for pid=2376 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:02.040000 audit[2376]: AVC avc: denied { perfmon } for pid=2376 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:02.040000 audit[2376]: AVC avc: denied { bpf } for pid=2376 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:02.040000 audit[2376]: AVC avc: denied { bpf } for pid=2376 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:02.040000 audit: BPF prog-id=89 op=LOAD Jul 10 01:00:02.040000 audit[2376]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffcef3bdf30 a2=98 a3=0 items=0 ppid=2255 pid=2376 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 01:00:02.040000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 10 01:00:02.041000 audit: BPF prog-id=89 op=UNLOAD Jul 10 01:00:02.041000 audit[2376]: AVC avc: denied { bpf } for pid=2376 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:02.041000 audit[2376]: AVC avc: denied { bpf } for pid=2376 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:02.041000 audit[2376]: AVC avc: denied { perfmon } for pid=2376 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:02.041000 audit[2376]: AVC avc: denied { perfmon } for pid=2376 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:02.041000 audit[2376]: AVC avc: denied { perfmon } for pid=2376 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:02.041000 audit[2376]: AVC avc: denied { perfmon } for pid=2376 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:02.041000 audit[2376]: AVC avc: denied { perfmon } for pid=2376 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:02.041000 audit[2376]: AVC avc: denied { bpf } for pid=2376 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:02.041000 audit[2376]: AVC avc: denied { bpf } for pid=2376 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:02.041000 audit: BPF prog-id=90 op=LOAD Jul 10 01:00:02.041000 audit[2376]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffcef3bdd40 a2=94 a3=54428f items=0 ppid=2255 pid=2376 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 01:00:02.041000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 10 01:00:02.041000 audit: BPF prog-id=90 op=UNLOAD Jul 10 01:00:02.041000 audit[2376]: AVC avc: denied { bpf } for pid=2376 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:02.041000 audit[2376]: AVC avc: denied { bpf } for pid=2376 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:02.041000 audit[2376]: AVC avc: denied { perfmon } for pid=2376 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:02.041000 audit[2376]: AVC avc: denied { perfmon } for pid=2376 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:02.041000 audit[2376]: AVC avc: denied { perfmon } for pid=2376 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:02.041000 audit[2376]: AVC avc: denied { perfmon } for pid=2376 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:02.041000 audit[2376]: AVC avc: denied { perfmon } for pid=2376 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:02.041000 audit[2376]: AVC avc: denied { bpf } for pid=2376 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:02.041000 audit[2376]: AVC avc: denied { bpf } for pid=2376 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:02.041000 audit: BPF prog-id=91 op=LOAD Jul 10 01:00:02.041000 audit[2376]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffcef3bdd70 a2=94 a3=2 items=0 ppid=2255 pid=2376 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 01:00:02.041000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 10 01:00:02.041000 audit: BPF prog-id=91 op=UNLOAD Jul 10 01:00:02.041000 audit[2376]: AVC avc: denied { bpf } for pid=2376 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:02.041000 audit[2376]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffcef3bdc40 a2=28 a3=0 items=0 ppid=2255 pid=2376 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 01:00:02.041000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 10 01:00:02.041000 audit[2376]: AVC avc: denied { bpf } for pid=2376 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:02.041000 audit[2376]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffcef3bdc70 a2=28 a3=0 items=0 ppid=2255 pid=2376 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 01:00:02.041000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 10 01:00:02.041000 audit[2376]: AVC avc: denied { bpf } for pid=2376 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:02.041000 audit[2376]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffcef3bdb80 a2=28 a3=0 items=0 ppid=2255 pid=2376 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 01:00:02.041000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 10 01:00:02.041000 audit[2376]: AVC avc: denied { bpf } for pid=2376 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:02.041000 audit[2376]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffcef3bdc90 a2=28 a3=0 items=0 ppid=2255 pid=2376 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 01:00:02.041000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 10 01:00:02.041000 audit[2376]: AVC avc: denied { bpf } for pid=2376 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:02.041000 audit[2376]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffcef3bdc70 a2=28 a3=0 items=0 ppid=2255 pid=2376 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 01:00:02.041000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 10 01:00:02.041000 audit[2376]: AVC avc: denied { bpf } for pid=2376 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:02.041000 audit[2376]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffcef3bdc60 a2=28 a3=0 items=0 ppid=2255 pid=2376 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 01:00:02.041000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 10 01:00:02.041000 audit[2376]: AVC avc: denied { bpf } for pid=2376 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:02.041000 audit[2376]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffcef3bdc90 a2=28 a3=0 items=0 ppid=2255 pid=2376 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 01:00:02.041000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 10 01:00:02.041000 audit[2376]: AVC avc: denied { bpf } for pid=2376 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:02.041000 audit[2376]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffcef3bdc70 a2=28 a3=0 items=0 ppid=2255 pid=2376 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 01:00:02.041000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 10 01:00:02.041000 audit[2376]: AVC avc: denied { bpf } for pid=2376 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:02.041000 audit[2376]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffcef3bdc90 a2=28 a3=0 items=0 ppid=2255 pid=2376 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 01:00:02.041000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 10 01:00:02.041000 audit[2376]: AVC avc: denied { bpf } for pid=2376 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:02.041000 audit[2376]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffcef3bdc60 a2=28 a3=0 items=0 ppid=2255 pid=2376 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 01:00:02.041000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 10 01:00:02.041000 audit[2376]: AVC avc: denied { bpf } for pid=2376 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:02.041000 audit[2376]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffcef3bdcd0 a2=28 a3=0 items=0 ppid=2255 pid=2376 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 01:00:02.041000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 10 01:00:02.041000 audit[2376]: AVC avc: denied { bpf } for pid=2376 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:02.041000 audit[2376]: AVC avc: denied { bpf } for pid=2376 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:02.041000 audit[2376]: AVC avc: denied { perfmon } for pid=2376 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:02.041000 audit[2376]: AVC avc: denied { perfmon } for pid=2376 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:02.041000 audit[2376]: AVC avc: denied { perfmon } for pid=2376 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:02.041000 audit[2376]: AVC avc: denied { perfmon } for pid=2376 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:02.041000 audit[2376]: AVC avc: denied { perfmon } for pid=2376 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:02.041000 audit[2376]: AVC avc: denied { bpf } for pid=2376 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:02.041000 audit[2376]: AVC avc: denied { bpf } for pid=2376 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:02.041000 audit: BPF prog-id=92 op=LOAD Jul 10 01:00:02.041000 audit[2376]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffcef3bdb40 a2=94 a3=0 items=0 ppid=2255 pid=2376 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 01:00:02.041000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 10 01:00:02.041000 audit: BPF prog-id=92 op=UNLOAD Jul 10 01:00:02.041000 audit[2376]: AVC avc: denied { bpf } for pid=2376 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:02.041000 audit[2376]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=0 a1=7ffcef3bdb30 a2=50 a3=2800 items=0 ppid=2255 pid=2376 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 01:00:02.041000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 10 01:00:02.042000 audit[2376]: AVC avc: denied { bpf } for pid=2376 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:02.042000 audit[2376]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=0 a1=7ffcef3bdb30 a2=50 a3=2800 items=0 ppid=2255 pid=2376 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 01:00:02.042000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 10 01:00:02.042000 audit[2376]: AVC avc: denied { bpf } for pid=2376 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:02.042000 audit[2376]: AVC avc: denied { bpf } for pid=2376 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:02.042000 audit[2376]: AVC avc: denied { bpf } for pid=2376 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:02.042000 audit[2376]: AVC avc: denied { perfmon } for pid=2376 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:02.042000 audit[2376]: AVC avc: denied { perfmon } for pid=2376 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:02.042000 audit[2376]: AVC avc: denied { perfmon } for pid=2376 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:02.042000 audit[2376]: AVC avc: denied { perfmon } for pid=2376 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:02.042000 audit[2376]: AVC avc: denied { perfmon } for pid=2376 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:02.042000 audit[2376]: AVC avc: denied { bpf } for pid=2376 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:02.042000 audit[2376]: AVC avc: denied { bpf } for pid=2376 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:02.042000 audit: BPF prog-id=93 op=LOAD Jul 10 01:00:02.042000 audit[2376]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffcef3bd350 a2=94 a3=2 items=0 ppid=2255 pid=2376 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 01:00:02.042000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 10 01:00:02.042000 audit: BPF prog-id=93 op=UNLOAD Jul 10 01:00:02.042000 audit[2376]: AVC avc: denied { bpf } for pid=2376 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:02.042000 audit[2376]: AVC avc: denied { bpf } for pid=2376 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:02.042000 audit[2376]: AVC avc: denied { bpf } for pid=2376 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:02.042000 audit[2376]: AVC avc: denied { perfmon } for pid=2376 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:02.042000 audit[2376]: AVC avc: denied { perfmon } for pid=2376 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:02.042000 audit[2376]: AVC avc: denied { perfmon } for pid=2376 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:02.042000 audit[2376]: AVC avc: denied { perfmon } for pid=2376 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:02.042000 audit[2376]: AVC avc: denied { perfmon } for pid=2376 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:02.042000 audit[2376]: AVC avc: denied { bpf } for pid=2376 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:02.042000 audit[2376]: AVC avc: denied { bpf } for pid=2376 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:02.042000 audit: BPF prog-id=94 op=LOAD Jul 10 01:00:02.042000 audit[2376]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffcef3bd450 a2=94 a3=30 items=0 ppid=2255 pid=2376 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 01:00:02.042000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 10 01:00:02.047000 audit[2379]: AVC avc: denied { bpf } for pid=2379 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:02.047000 audit[2379]: AVC avc: denied { bpf } for pid=2379 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:02.047000 audit[2379]: AVC avc: denied { perfmon } for pid=2379 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:02.047000 audit[2379]: AVC avc: denied { perfmon } for pid=2379 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:02.047000 audit[2379]: AVC avc: denied { perfmon } for pid=2379 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:02.047000 audit[2379]: AVC avc: denied { perfmon } for pid=2379 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:02.047000 audit[2379]: AVC avc: denied { perfmon } for pid=2379 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:02.047000 audit[2379]: AVC avc: denied { bpf } for pid=2379 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:02.047000 audit[2379]: AVC avc: denied { bpf } for pid=2379 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:02.047000 audit: BPF prog-id=95 op=LOAD Jul 10 01:00:02.047000 audit[2379]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffe80c7d2b0 a2=98 a3=0 items=0 ppid=2255 pid=2379 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 01:00:02.047000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 10 01:00:02.047000 audit: BPF prog-id=95 op=UNLOAD Jul 10 01:00:02.047000 audit[2379]: AVC avc: denied { bpf } for pid=2379 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:02.047000 audit[2379]: AVC avc: denied { bpf } for pid=2379 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:02.047000 audit[2379]: AVC avc: denied { perfmon } for pid=2379 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:02.047000 audit[2379]: AVC avc: denied { perfmon } for pid=2379 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:02.047000 audit[2379]: AVC avc: denied { perfmon } for pid=2379 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:02.047000 audit[2379]: AVC avc: denied { perfmon } for pid=2379 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:02.047000 audit[2379]: AVC avc: denied { perfmon } for pid=2379 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:02.047000 audit[2379]: AVC avc: denied { bpf } for pid=2379 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:02.047000 audit[2379]: AVC avc: denied { bpf } for pid=2379 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:02.047000 audit: BPF prog-id=96 op=LOAD Jul 10 01:00:02.047000 audit[2379]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffe80c7d0a0 a2=94 a3=54428f items=0 ppid=2255 pid=2379 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 01:00:02.047000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 10 01:00:02.047000 audit: BPF prog-id=96 op=UNLOAD Jul 10 01:00:02.047000 audit[2379]: AVC avc: denied { bpf } for pid=2379 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:02.047000 audit[2379]: AVC avc: denied { bpf } for pid=2379 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:02.047000 audit[2379]: AVC avc: denied { perfmon } for pid=2379 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:02.047000 audit[2379]: AVC avc: denied { perfmon } for pid=2379 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:02.047000 audit[2379]: AVC avc: denied { perfmon } for pid=2379 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:02.047000 audit[2379]: AVC avc: denied { perfmon } for pid=2379 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:02.047000 audit[2379]: AVC avc: denied { perfmon } for pid=2379 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:02.047000 audit[2379]: AVC avc: denied { bpf } for pid=2379 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:02.047000 audit[2379]: AVC avc: denied { bpf } for pid=2379 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:02.047000 audit: BPF prog-id=97 op=LOAD Jul 10 01:00:02.047000 audit[2379]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffe80c7d0d0 a2=94 a3=2 items=0 ppid=2255 pid=2379 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 01:00:02.047000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 10 01:00:02.048000 audit: BPF prog-id=97 op=UNLOAD Jul 10 01:00:02.075880 kubelet[1620]: E0710 01:00:02.075851 1620 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 01:00:02.133000 audit[2379]: AVC avc: denied { bpf } for pid=2379 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:02.133000 audit[2379]: AVC avc: denied { bpf } for pid=2379 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:02.133000 audit[2379]: AVC avc: denied { perfmon } for pid=2379 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:02.133000 audit[2379]: AVC avc: denied { perfmon } for pid=2379 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:02.133000 audit[2379]: AVC avc: denied { perfmon } for pid=2379 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:02.133000 audit[2379]: AVC avc: denied { perfmon } for pid=2379 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:02.133000 audit[2379]: AVC avc: denied { perfmon } for pid=2379 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:02.133000 audit[2379]: AVC avc: denied { bpf } for pid=2379 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:02.133000 audit[2379]: AVC avc: denied { bpf } for pid=2379 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:02.133000 audit: BPF prog-id=98 op=LOAD Jul 10 01:00:02.133000 audit[2379]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffe80c7cf90 a2=94 a3=1 items=0 ppid=2255 pid=2379 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 01:00:02.133000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 10 01:00:02.133000 audit: BPF prog-id=98 op=UNLOAD Jul 10 01:00:02.133000 audit[2379]: AVC avc: denied { perfmon } for pid=2379 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:02.133000 audit[2379]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffe80c7d060 a2=50 a3=7ffe80c7d140 items=0 ppid=2255 pid=2379 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 01:00:02.133000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 10 01:00:02.144000 audit[2379]: AVC avc: denied { bpf } for pid=2379 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:02.144000 audit[2379]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe80c7cfa0 a2=28 a3=0 items=0 ppid=2255 pid=2379 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 01:00:02.144000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 10 01:00:02.145000 audit[2379]: AVC avc: denied { bpf } for pid=2379 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:02.145000 audit[2379]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe80c7cfd0 a2=28 a3=0 items=0 ppid=2255 pid=2379 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 01:00:02.145000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 10 01:00:02.145000 audit[2379]: AVC avc: denied { bpf } for pid=2379 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:02.145000 audit[2379]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe80c7cee0 a2=28 a3=0 items=0 ppid=2255 pid=2379 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 01:00:02.145000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 10 01:00:02.145000 audit[2379]: AVC avc: denied { bpf } for pid=2379 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:02.145000 audit[2379]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe80c7cff0 a2=28 a3=0 items=0 ppid=2255 pid=2379 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 01:00:02.145000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 10 01:00:02.145000 audit[2379]: AVC avc: denied { bpf } for pid=2379 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:02.145000 audit[2379]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe80c7cfd0 a2=28 a3=0 items=0 ppid=2255 pid=2379 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 01:00:02.145000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 10 01:00:02.145000 audit[2379]: AVC avc: denied { bpf } for pid=2379 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:02.145000 audit[2379]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe80c7cfc0 a2=28 a3=0 items=0 ppid=2255 pid=2379 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 01:00:02.145000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 10 01:00:02.145000 audit[2379]: AVC avc: denied { bpf } for pid=2379 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:02.145000 audit[2379]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe80c7cff0 a2=28 a3=0 items=0 ppid=2255 pid=2379 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 01:00:02.145000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 10 01:00:02.145000 audit[2379]: AVC avc: denied { bpf } for pid=2379 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:02.145000 audit[2379]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe80c7cfd0 a2=28 a3=0 items=0 ppid=2255 pid=2379 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 01:00:02.145000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 10 01:00:02.145000 audit[2379]: AVC avc: denied { bpf } for pid=2379 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:02.145000 audit[2379]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe80c7cff0 a2=28 a3=0 items=0 ppid=2255 pid=2379 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 01:00:02.145000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 10 01:00:02.145000 audit[2379]: AVC avc: denied { bpf } for pid=2379 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:02.145000 audit[2379]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe80c7cfc0 a2=28 a3=0 items=0 ppid=2255 pid=2379 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 01:00:02.145000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 10 01:00:02.145000 audit[2379]: AVC avc: denied { bpf } for pid=2379 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:02.145000 audit[2379]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe80c7d030 a2=28 a3=0 items=0 ppid=2255 pid=2379 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 01:00:02.145000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 10 01:00:02.145000 audit[2379]: AVC avc: denied { perfmon } for pid=2379 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:02.145000 audit[2379]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffe80c7cde0 a2=50 a3=1 items=0 ppid=2255 pid=2379 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 01:00:02.145000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 10 01:00:02.145000 audit[2379]: AVC avc: denied { bpf } for pid=2379 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:02.145000 audit[2379]: AVC avc: denied { bpf } for pid=2379 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:02.145000 audit[2379]: AVC avc: denied { perfmon } for pid=2379 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:02.145000 audit[2379]: AVC avc: denied { perfmon } for pid=2379 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:02.145000 audit[2379]: AVC avc: denied { perfmon } for pid=2379 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:02.145000 audit[2379]: AVC avc: denied { perfmon } for pid=2379 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:02.145000 audit[2379]: AVC avc: denied { perfmon } for pid=2379 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:02.145000 audit[2379]: AVC avc: denied { bpf } for pid=2379 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:02.145000 audit[2379]: AVC avc: denied { bpf } for pid=2379 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:02.145000 audit: BPF prog-id=99 op=LOAD Jul 10 01:00:02.145000 audit[2379]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffe80c7cde0 a2=94 a3=5 items=0 ppid=2255 pid=2379 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 01:00:02.145000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 10 01:00:02.145000 audit: BPF prog-id=99 op=UNLOAD Jul 10 01:00:02.145000 audit[2379]: AVC avc: denied { perfmon } for pid=2379 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:02.145000 audit[2379]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffe80c7ce90 a2=50 a3=1 items=0 ppid=2255 pid=2379 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 01:00:02.145000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 10 01:00:02.145000 audit[2379]: AVC avc: denied { bpf } for pid=2379 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:02.145000 audit[2379]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffe80c7cfb0 a2=4 a3=38 items=0 ppid=2255 pid=2379 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 01:00:02.145000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 10 01:00:02.145000 audit[2379]: AVC avc: denied { bpf } for pid=2379 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:02.145000 audit[2379]: AVC avc: denied { bpf } for pid=2379 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:02.145000 audit[2379]: AVC avc: denied { perfmon } for pid=2379 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:02.145000 audit[2379]: AVC avc: denied { bpf } for pid=2379 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:02.145000 audit[2379]: AVC avc: denied { perfmon } for pid=2379 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:02.145000 audit[2379]: AVC avc: denied { perfmon } for pid=2379 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:02.145000 audit[2379]: AVC avc: denied { perfmon } for pid=2379 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:02.145000 audit[2379]: AVC avc: denied { perfmon } for pid=2379 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:02.145000 audit[2379]: AVC avc: denied { perfmon } for pid=2379 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:02.145000 audit[2379]: AVC avc: denied { bpf } for pid=2379 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:02.145000 audit[2379]: AVC avc: denied { confidentiality } for pid=2379 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 01:00:02.145000 audit[2379]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffe80c7d000 a2=94 a3=6 items=0 ppid=2255 pid=2379 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 01:00:02.145000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 10 01:00:02.145000 audit[2379]: AVC avc: denied { bpf } for pid=2379 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:02.145000 audit[2379]: AVC avc: denied { bpf } for pid=2379 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:02.145000 audit[2379]: AVC avc: denied { perfmon } for pid=2379 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:02.145000 audit[2379]: AVC avc: denied { bpf } for pid=2379 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:02.145000 audit[2379]: AVC avc: denied { perfmon } for pid=2379 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:02.145000 audit[2379]: AVC avc: denied { perfmon } for pid=2379 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:02.145000 audit[2379]: AVC avc: denied { perfmon } for pid=2379 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:02.145000 audit[2379]: AVC avc: denied { perfmon } for pid=2379 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:02.145000 audit[2379]: AVC avc: denied { perfmon } for pid=2379 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:02.145000 audit[2379]: AVC avc: denied { bpf } for pid=2379 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:02.145000 audit[2379]: AVC avc: denied { confidentiality } for pid=2379 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 01:00:02.145000 audit[2379]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffe80c7c7b0 a2=94 a3=88 items=0 ppid=2255 pid=2379 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 01:00:02.145000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 10 01:00:02.145000 audit[2379]: AVC avc: denied { bpf } for pid=2379 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:02.145000 audit[2379]: AVC avc: denied { bpf } for pid=2379 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:02.145000 audit[2379]: AVC avc: denied { perfmon } for pid=2379 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:02.145000 audit[2379]: AVC avc: denied { bpf } for pid=2379 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:02.145000 audit[2379]: AVC avc: denied { perfmon } for pid=2379 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:02.145000 audit[2379]: AVC avc: denied { perfmon } for pid=2379 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:02.145000 audit[2379]: AVC avc: denied { perfmon } for pid=2379 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:02.145000 audit[2379]: AVC avc: denied { perfmon } for pid=2379 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:02.145000 audit[2379]: AVC avc: denied { perfmon } for pid=2379 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:02.145000 audit[2379]: AVC avc: denied { bpf } for pid=2379 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:02.145000 audit[2379]: AVC avc: denied { confidentiality } for pid=2379 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 01:00:02.145000 audit[2379]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffe80c7c7b0 a2=94 a3=88 items=0 ppid=2255 pid=2379 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 01:00:02.145000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 10 01:00:02.146000 audit[2379]: AVC avc: denied { bpf } for pid=2379 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:02.146000 audit[2379]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe80c7e1e0 a2=10 a3=f8f00800 items=0 ppid=2255 pid=2379 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 01:00:02.146000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 10 01:00:02.146000 audit[2379]: AVC avc: denied { bpf } for pid=2379 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:02.146000 audit[2379]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe80c7e080 a2=10 a3=3 items=0 ppid=2255 pid=2379 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 01:00:02.146000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 10 01:00:02.146000 audit[2379]: AVC avc: denied { bpf } for pid=2379 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:02.146000 audit[2379]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe80c7e020 a2=10 a3=3 items=0 ppid=2255 pid=2379 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 01:00:02.146000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 10 01:00:02.146000 audit[2379]: AVC avc: denied { bpf } for pid=2379 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:02.146000 audit[2379]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe80c7e020 a2=10 a3=7 items=0 ppid=2255 pid=2379 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 01:00:02.146000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 10 01:00:02.154000 audit: BPF prog-id=94 op=UNLOAD Jul 10 01:00:02.256000 audit[2412]: NETFILTER_CFG table=nat:65 family=2 entries=15 op=nft_register_chain pid=2412 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 10 01:00:02.256000 audit[2412]: SYSCALL arch=c000003e syscall=46 success=yes exit=5084 a0=3 a1=7fff6cdfc5b0 a2=0 a3=7fff6cdfc59c items=0 ppid=2255 pid=2412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 01:00:02.256000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 10 01:00:02.257000 audit[2415]: NETFILTER_CFG table=mangle:66 family=2 entries=16 op=nft_register_chain pid=2415 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 10 01:00:02.257000 audit[2415]: SYSCALL arch=c000003e syscall=46 success=yes exit=6868 a0=3 a1=7ffeb649bc60 a2=0 a3=7ffeb649bc4c items=0 ppid=2255 pid=2415 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 01:00:02.257000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 10 01:00:02.267000 audit[2416]: NETFILTER_CFG table=filter:67 family=2 entries=39 op=nft_register_chain pid=2416 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 10 01:00:02.267000 audit[2416]: SYSCALL arch=c000003e syscall=46 success=yes exit=18968 a0=3 a1=7fffc63d43e0 a2=0 a3=7fffc63d43cc items=0 ppid=2255 pid=2416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 01:00:02.267000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 10 01:00:02.279000 audit[2413]: NETFILTER_CFG table=raw:68 family=2 entries=21 op=nft_register_chain pid=2413 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 10 01:00:02.279000 audit[2413]: SYSCALL arch=c000003e syscall=46 success=yes exit=8452 a0=3 a1=7ffe4e9ebef0 a2=0 a3=7ffe4e9ebedc items=0 ppid=2255 pid=2413 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 01:00:02.279000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 10 01:00:03.076881 kubelet[1620]: E0710 01:00:03.076852 1620 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 01:00:03.864563 systemd-networkd[1081]: vxlan.calico: Gained IPv6LL Jul 10 01:00:04.077711 kubelet[1620]: E0710 01:00:04.077684 1620 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 01:00:05.079057 kubelet[1620]: E0710 01:00:05.079027 1620 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 01:00:05.173455 env[1286]: time="2025-07-10T01:00:05.173395100Z" level=info msg="StopPodSandbox for \"34764dfbe2bcfa7c27deac9036fcf32920e6740c56f3a4e57f377c66f514490b\"" Jul 10 01:00:06.080406 kubelet[1620]: E0710 01:00:06.080349 1620 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 01:00:06.516647 env[1286]: 2025-07-10 01:00:05.544 [INFO][2435] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="34764dfbe2bcfa7c27deac9036fcf32920e6740c56f3a4e57f377c66f514490b" Jul 10 01:00:06.516647 env[1286]: 2025-07-10 01:00:05.558 [INFO][2435] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="34764dfbe2bcfa7c27deac9036fcf32920e6740c56f3a4e57f377c66f514490b" iface="eth0" netns="/var/run/netns/cni-af0bf959-7db4-6c9f-7b9d-5ab9d6345034" Jul 10 01:00:06.516647 env[1286]: 2025-07-10 01:00:05.564 [INFO][2435] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="34764dfbe2bcfa7c27deac9036fcf32920e6740c56f3a4e57f377c66f514490b" iface="eth0" netns="/var/run/netns/cni-af0bf959-7db4-6c9f-7b9d-5ab9d6345034" Jul 10 01:00:06.516647 env[1286]: 2025-07-10 01:00:05.572 [INFO][2435] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="34764dfbe2bcfa7c27deac9036fcf32920e6740c56f3a4e57f377c66f514490b" iface="eth0" netns="/var/run/netns/cni-af0bf959-7db4-6c9f-7b9d-5ab9d6345034" Jul 10 01:00:06.516647 env[1286]: 2025-07-10 01:00:05.572 [INFO][2435] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="34764dfbe2bcfa7c27deac9036fcf32920e6740c56f3a4e57f377c66f514490b" Jul 10 01:00:06.516647 env[1286]: 2025-07-10 01:00:05.572 [INFO][2435] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="34764dfbe2bcfa7c27deac9036fcf32920e6740c56f3a4e57f377c66f514490b" Jul 10 01:00:06.516647 env[1286]: 2025-07-10 01:00:06.477 [INFO][2443] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="34764dfbe2bcfa7c27deac9036fcf32920e6740c56f3a4e57f377c66f514490b" HandleID="k8s-pod-network.34764dfbe2bcfa7c27deac9036fcf32920e6740c56f3a4e57f377c66f514490b" Workload="10.67.124.135-k8s-csi--node--driver--bfm74-eth0" Jul 10 01:00:06.516647 env[1286]: 2025-07-10 01:00:06.480 [INFO][2443] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Jul 10 01:00:06.516647 env[1286]: 2025-07-10 01:00:06.481 [INFO][2443] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Jul 10 01:00:06.516647 env[1286]: 2025-07-10 01:00:06.511 [WARNING][2443] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="34764dfbe2bcfa7c27deac9036fcf32920e6740c56f3a4e57f377c66f514490b" HandleID="k8s-pod-network.34764dfbe2bcfa7c27deac9036fcf32920e6740c56f3a4e57f377c66f514490b" Workload="10.67.124.135-k8s-csi--node--driver--bfm74-eth0" Jul 10 01:00:06.516647 env[1286]: 2025-07-10 01:00:06.511 [INFO][2443] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="34764dfbe2bcfa7c27deac9036fcf32920e6740c56f3a4e57f377c66f514490b" HandleID="k8s-pod-network.34764dfbe2bcfa7c27deac9036fcf32920e6740c56f3a4e57f377c66f514490b" Workload="10.67.124.135-k8s-csi--node--driver--bfm74-eth0" Jul 10 01:00:06.516647 env[1286]: 2025-07-10 01:00:06.514 [INFO][2443] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Jul 10 01:00:06.516647 env[1286]: 2025-07-10 01:00:06.515 [INFO][2435] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="34764dfbe2bcfa7c27deac9036fcf32920e6740c56f3a4e57f377c66f514490b" Jul 10 01:00:06.518829 systemd[1]: run-netns-cni\x2daf0bf959\x2d7db4\x2d6c9f\x2d7b9d\x2d5ab9d6345034.mount: Deactivated successfully. Jul 10 01:00:06.519860 env[1286]: time="2025-07-10T01:00:06.519828759Z" level=info msg="TearDown network for sandbox \"34764dfbe2bcfa7c27deac9036fcf32920e6740c56f3a4e57f377c66f514490b\" successfully" Jul 10 01:00:06.519944 env[1286]: time="2025-07-10T01:00:06.519927513Z" level=info msg="StopPodSandbox for \"34764dfbe2bcfa7c27deac9036fcf32920e6740c56f3a4e57f377c66f514490b\" returns successfully" Jul 10 01:00:06.520569 env[1286]: time="2025-07-10T01:00:06.520543315Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-bfm74,Uid:f8539811-5553-42c4-b972-5bfd95d2de66,Namespace:calico-system,Attempt:1,}" Jul 10 01:00:06.826724 systemd-networkd[1081]: calic6b2b40d61a: Link UP Jul 10 01:00:06.829913 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Jul 10 01:00:06.829975 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calic6b2b40d61a: link becomes ready Jul 10 01:00:06.830934 systemd-networkd[1081]: calic6b2b40d61a: Gained carrier Jul 10 01:00:06.916199 env[1286]: 2025-07-10 01:00:06.583 [INFO][2450] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.67.124.135-k8s-csi--node--driver--bfm74-eth0 csi-node-driver- calico-system f8539811-5553-42c4-b972-5bfd95d2de66 1309 0 2025-07-10 00:59:42 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:8967bcb6f k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:csi-node-driver] map[] [] [] []} {k8s 10.67.124.135 csi-node-driver-bfm74 eth0 csi-node-driver [] [] [kns.calico-system ksa.calico-system.csi-node-driver] calic6b2b40d61a [] [] }} ContainerID="81ce65593d66ae89d14ff4e2d7c22b2ae06740d7771ebc5b47ffc184c1a028b8" Namespace="calico-system" Pod="csi-node-driver-bfm74" WorkloadEndpoint="10.67.124.135-k8s-csi--node--driver--bfm74-" Jul 10 01:00:06.916199 env[1286]: 2025-07-10 01:00:06.583 [INFO][2450] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="81ce65593d66ae89d14ff4e2d7c22b2ae06740d7771ebc5b47ffc184c1a028b8" Namespace="calico-system" Pod="csi-node-driver-bfm74" WorkloadEndpoint="10.67.124.135-k8s-csi--node--driver--bfm74-eth0" Jul 10 01:00:06.916199 env[1286]: 2025-07-10 01:00:06.606 [INFO][2463] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="81ce65593d66ae89d14ff4e2d7c22b2ae06740d7771ebc5b47ffc184c1a028b8" HandleID="k8s-pod-network.81ce65593d66ae89d14ff4e2d7c22b2ae06740d7771ebc5b47ffc184c1a028b8" Workload="10.67.124.135-k8s-csi--node--driver--bfm74-eth0" Jul 10 01:00:06.916199 env[1286]: 2025-07-10 01:00:06.606 [INFO][2463] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="81ce65593d66ae89d14ff4e2d7c22b2ae06740d7771ebc5b47ffc184c1a028b8" HandleID="k8s-pod-network.81ce65593d66ae89d14ff4e2d7c22b2ae06740d7771ebc5b47ffc184c1a028b8" Workload="10.67.124.135-k8s-csi--node--driver--bfm74-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002d5040), Attrs:map[string]string{"namespace":"calico-system", "node":"10.67.124.135", "pod":"csi-node-driver-bfm74", "timestamp":"2025-07-10 01:00:06.606743117 +0000 UTC"}, Hostname:"10.67.124.135", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Jul 10 01:00:06.916199 env[1286]: 2025-07-10 01:00:06.606 [INFO][2463] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Jul 10 01:00:06.916199 env[1286]: 2025-07-10 01:00:06.606 [INFO][2463] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Jul 10 01:00:06.916199 env[1286]: 2025-07-10 01:00:06.607 [INFO][2463] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.67.124.135' Jul 10 01:00:06.916199 env[1286]: 2025-07-10 01:00:06.702 [INFO][2463] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.81ce65593d66ae89d14ff4e2d7c22b2ae06740d7771ebc5b47ffc184c1a028b8" host="10.67.124.135" Jul 10 01:00:06.916199 env[1286]: 2025-07-10 01:00:06.716 [INFO][2463] ipam/ipam.go 394: Looking up existing affinities for host host="10.67.124.135" Jul 10 01:00:06.916199 env[1286]: 2025-07-10 01:00:06.721 [INFO][2463] ipam/ipam.go 511: Trying affinity for 192.168.53.128/26 host="10.67.124.135" Jul 10 01:00:06.916199 env[1286]: 2025-07-10 01:00:06.722 [INFO][2463] ipam/ipam.go 158: Attempting to load block cidr=192.168.53.128/26 host="10.67.124.135" Jul 10 01:00:06.916199 env[1286]: 2025-07-10 01:00:06.724 [INFO][2463] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.53.128/26 host="10.67.124.135" Jul 10 01:00:06.916199 env[1286]: 2025-07-10 01:00:06.724 [INFO][2463] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.53.128/26 handle="k8s-pod-network.81ce65593d66ae89d14ff4e2d7c22b2ae06740d7771ebc5b47ffc184c1a028b8" host="10.67.124.135" Jul 10 01:00:06.916199 env[1286]: 2025-07-10 01:00:06.726 [INFO][2463] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.81ce65593d66ae89d14ff4e2d7c22b2ae06740d7771ebc5b47ffc184c1a028b8 Jul 10 01:00:06.916199 env[1286]: 2025-07-10 01:00:06.790 [INFO][2463] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.53.128/26 handle="k8s-pod-network.81ce65593d66ae89d14ff4e2d7c22b2ae06740d7771ebc5b47ffc184c1a028b8" host="10.67.124.135" Jul 10 01:00:06.916199 env[1286]: 2025-07-10 01:00:06.818 [INFO][2463] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.53.129/26] block=192.168.53.128/26 handle="k8s-pod-network.81ce65593d66ae89d14ff4e2d7c22b2ae06740d7771ebc5b47ffc184c1a028b8" host="10.67.124.135" Jul 10 01:00:06.916199 env[1286]: 2025-07-10 01:00:06.818 [INFO][2463] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.53.129/26] handle="k8s-pod-network.81ce65593d66ae89d14ff4e2d7c22b2ae06740d7771ebc5b47ffc184c1a028b8" host="10.67.124.135" Jul 10 01:00:06.916199 env[1286]: 2025-07-10 01:00:06.818 [INFO][2463] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Jul 10 01:00:06.916199 env[1286]: 2025-07-10 01:00:06.818 [INFO][2463] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.53.129/26] IPv6=[] ContainerID="81ce65593d66ae89d14ff4e2d7c22b2ae06740d7771ebc5b47ffc184c1a028b8" HandleID="k8s-pod-network.81ce65593d66ae89d14ff4e2d7c22b2ae06740d7771ebc5b47ffc184c1a028b8" Workload="10.67.124.135-k8s-csi--node--driver--bfm74-eth0" Jul 10 01:00:06.916719 env[1286]: 2025-07-10 01:00:06.820 [INFO][2450] cni-plugin/k8s.go 418: Populated endpoint ContainerID="81ce65593d66ae89d14ff4e2d7c22b2ae06740d7771ebc5b47ffc184c1a028b8" Namespace="calico-system" Pod="csi-node-driver-bfm74" WorkloadEndpoint="10.67.124.135-k8s-csi--node--driver--bfm74-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.67.124.135-k8s-csi--node--driver--bfm74-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"f8539811-5553-42c4-b972-5bfd95d2de66", ResourceVersion:"1309", Generation:0, CreationTimestamp:time.Date(2025, time.July, 10, 0, 59, 42, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"8967bcb6f", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.67.124.135", ContainerID:"", Pod:"csi-node-driver-bfm74", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.53.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"calic6b2b40d61a", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Jul 10 01:00:06.916719 env[1286]: 2025-07-10 01:00:06.820 [INFO][2450] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.53.129/32] ContainerID="81ce65593d66ae89d14ff4e2d7c22b2ae06740d7771ebc5b47ffc184c1a028b8" Namespace="calico-system" Pod="csi-node-driver-bfm74" WorkloadEndpoint="10.67.124.135-k8s-csi--node--driver--bfm74-eth0" Jul 10 01:00:06.916719 env[1286]: 2025-07-10 01:00:06.820 [INFO][2450] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calic6b2b40d61a ContainerID="81ce65593d66ae89d14ff4e2d7c22b2ae06740d7771ebc5b47ffc184c1a028b8" Namespace="calico-system" Pod="csi-node-driver-bfm74" WorkloadEndpoint="10.67.124.135-k8s-csi--node--driver--bfm74-eth0" Jul 10 01:00:06.916719 env[1286]: 2025-07-10 01:00:06.833 [INFO][2450] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="81ce65593d66ae89d14ff4e2d7c22b2ae06740d7771ebc5b47ffc184c1a028b8" Namespace="calico-system" Pod="csi-node-driver-bfm74" WorkloadEndpoint="10.67.124.135-k8s-csi--node--driver--bfm74-eth0" Jul 10 01:00:06.916719 env[1286]: 2025-07-10 01:00:06.833 [INFO][2450] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="81ce65593d66ae89d14ff4e2d7c22b2ae06740d7771ebc5b47ffc184c1a028b8" Namespace="calico-system" Pod="csi-node-driver-bfm74" WorkloadEndpoint="10.67.124.135-k8s-csi--node--driver--bfm74-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.67.124.135-k8s-csi--node--driver--bfm74-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"f8539811-5553-42c4-b972-5bfd95d2de66", ResourceVersion:"1309", Generation:0, CreationTimestamp:time.Date(2025, time.July, 10, 0, 59, 42, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"8967bcb6f", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.67.124.135", ContainerID:"81ce65593d66ae89d14ff4e2d7c22b2ae06740d7771ebc5b47ffc184c1a028b8", Pod:"csi-node-driver-bfm74", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.53.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"calic6b2b40d61a", MAC:"6e:f8:ec:42:0f:23", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Jul 10 01:00:06.916719 env[1286]: 2025-07-10 01:00:06.914 [INFO][2450] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="81ce65593d66ae89d14ff4e2d7c22b2ae06740d7771ebc5b47ffc184c1a028b8" Namespace="calico-system" Pod="csi-node-driver-bfm74" WorkloadEndpoint="10.67.124.135-k8s-csi--node--driver--bfm74-eth0" Jul 10 01:00:06.927766 env[1286]: time="2025-07-10T01:00:06.927721643Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 10 01:00:06.927894 env[1286]: time="2025-07-10T01:00:06.927879300Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 10 01:00:06.927974 env[1286]: time="2025-07-10T01:00:06.927954841Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 10 01:00:06.928231 env[1286]: time="2025-07-10T01:00:06.928212897Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/81ce65593d66ae89d14ff4e2d7c22b2ae06740d7771ebc5b47ffc184c1a028b8 pid=2485 runtime=io.containerd.runc.v2 Jul 10 01:00:06.938827 systemd[1]: Started cri-containerd-81ce65593d66ae89d14ff4e2d7c22b2ae06740d7771ebc5b47ffc184c1a028b8.scope. Jul 10 01:00:06.955428 kernel: kauditd_printk_skb: 596 callbacks suppressed Jul 10 01:00:06.955550 kernel: audit: type=1400 audit(1752109206.950:644): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:06.955576 kernel: audit: type=1400 audit(1752109206.950:645): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:06.950000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:06.950000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:06.950000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:06.959578 kernel: audit: type=1400 audit(1752109206.950:646): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:06.959609 kernel: audit: type=1400 audit(1752109206.950:647): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:06.950000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:06.950000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:06.964401 kernel: audit: type=1400 audit(1752109206.950:648): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:06.964456 kernel: audit: type=1400 audit(1752109206.950:649): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:06.950000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:06.966773 kernel: audit: type=1400 audit(1752109206.950:650): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:06.950000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:06.969147 kernel: audit: type=1400 audit(1752109206.950:651): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:06.950000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:06.971917 systemd-resolved[1222]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Jul 10 01:00:06.950000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:06.974392 kernel: audit: type=1400 audit(1752109206.950:652): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:06.953000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:06.953000 audit: BPF prog-id=100 op=LOAD Jul 10 01:00:06.955000 audit[2496]: AVC avc: denied { bpf } for pid=2496 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:06.955000 audit[2496]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=2485 pid=2496 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 01:00:06.955000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3831636536353539336436366165383964313466663465326437633232 Jul 10 01:00:06.955000 audit[2496]: AVC avc: denied { perfmon } for pid=2496 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:06.955000 audit[2496]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=c items=0 ppid=2485 pid=2496 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 01:00:06.955000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3831636536353539336436366165383964313466663465326437633232 Jul 10 01:00:06.955000 audit[2496]: AVC avc: denied { bpf } for pid=2496 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:06.977425 kernel: audit: type=1400 audit(1752109206.953:653): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:06.955000 audit[2496]: AVC avc: denied { bpf } for pid=2496 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:06.955000 audit[2496]: AVC avc: denied { bpf } for pid=2496 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:06.955000 audit[2496]: AVC avc: denied { perfmon } for pid=2496 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:06.955000 audit[2496]: AVC avc: denied { perfmon } for pid=2496 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:06.955000 audit[2496]: AVC avc: denied { perfmon } for pid=2496 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:06.955000 audit[2496]: AVC avc: denied { perfmon } for pid=2496 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:06.955000 audit[2496]: AVC avc: denied { perfmon } for pid=2496 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:06.955000 audit[2496]: AVC avc: denied { bpf } for pid=2496 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:06.955000 audit[2496]: AVC avc: denied { bpf } for pid=2496 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:06.955000 audit: BPF prog-id=101 op=LOAD Jul 10 01:00:06.955000 audit[2496]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c000025520 items=0 ppid=2485 pid=2496 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 01:00:06.955000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3831636536353539336436366165383964313466663465326437633232 Jul 10 01:00:06.960000 audit[2496]: AVC avc: denied { bpf } for pid=2496 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:06.960000 audit[2496]: AVC avc: denied { bpf } for pid=2496 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:06.960000 audit[2496]: AVC avc: denied { perfmon } for pid=2496 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:06.960000 audit[2496]: AVC avc: denied { perfmon } for pid=2496 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:06.960000 audit[2496]: AVC avc: denied { perfmon } for pid=2496 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:06.960000 audit[2496]: AVC avc: denied { perfmon } for pid=2496 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:06.960000 audit[2496]: AVC avc: denied { perfmon } for pid=2496 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:06.960000 audit[2496]: AVC avc: denied { bpf } for pid=2496 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:06.960000 audit[2496]: AVC avc: denied { bpf } for pid=2496 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:06.960000 audit: BPF prog-id=102 op=LOAD Jul 10 01:00:06.960000 audit[2496]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c000025568 items=0 ppid=2485 pid=2496 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 01:00:06.960000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3831636536353539336436366165383964313466663465326437633232 Jul 10 01:00:06.967000 audit: BPF prog-id=102 op=UNLOAD Jul 10 01:00:06.967000 audit: BPF prog-id=101 op=UNLOAD Jul 10 01:00:06.967000 audit[2496]: AVC avc: denied { bpf } for pid=2496 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:06.967000 audit[2496]: AVC avc: denied { bpf } for pid=2496 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:06.967000 audit[2496]: AVC avc: denied { bpf } for pid=2496 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:06.967000 audit[2496]: AVC avc: denied { perfmon } for pid=2496 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:06.967000 audit[2496]: AVC avc: denied { perfmon } for pid=2496 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:06.967000 audit[2496]: AVC avc: denied { perfmon } for pid=2496 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:06.967000 audit[2496]: AVC avc: denied { perfmon } for pid=2496 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:06.967000 audit[2496]: AVC avc: denied { perfmon } for pid=2496 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:06.967000 audit[2496]: AVC avc: denied { bpf } for pid=2496 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:06.967000 audit[2496]: AVC avc: denied { bpf } for pid=2496 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:06.967000 audit: BPF prog-id=103 op=LOAD Jul 10 01:00:06.967000 audit[2496]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c000025978 items=0 ppid=2485 pid=2496 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 01:00:06.967000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3831636536353539336436366165383964313466663465326437633232 Jul 10 01:00:06.983915 env[1286]: time="2025-07-10T01:00:06.983888783Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-bfm74,Uid:f8539811-5553-42c4-b972-5bfd95d2de66,Namespace:calico-system,Attempt:1,} returns sandbox id \"81ce65593d66ae89d14ff4e2d7c22b2ae06740d7771ebc5b47ffc184c1a028b8\"" Jul 10 01:00:06.984833 env[1286]: time="2025-07-10T01:00:06.984697997Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.30.2\"" Jul 10 01:00:07.080851 kubelet[1620]: E0710 01:00:07.080739 1620 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 01:00:07.338000 audit[2528]: NETFILTER_CFG table=filter:69 family=2 entries=38 op=nft_register_chain pid=2528 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 10 01:00:07.338000 audit[2528]: SYSCALL arch=c000003e syscall=46 success=yes exit=21364 a0=3 a1=7fffca488da0 a2=0 a3=7fffca488d8c items=0 ppid=2255 pid=2528 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 01:00:07.338000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 10 01:00:07.518611 systemd[1]: run-containerd-runc-k8s.io-81ce65593d66ae89d14ff4e2d7c22b2ae06740d7771ebc5b47ffc184c1a028b8-runc.S8bw2b.mount: Deactivated successfully. Jul 10 01:00:08.081399 kubelet[1620]: E0710 01:00:08.081350 1620 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 01:00:08.664583 systemd-networkd[1081]: calic6b2b40d61a: Gained IPv6LL Jul 10 01:00:09.081762 kubelet[1620]: E0710 01:00:09.081730 1620 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 01:00:10.082837 kubelet[1620]: E0710 01:00:10.082788 1620 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 01:00:11.083219 kubelet[1620]: E0710 01:00:11.083153 1620 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 01:00:12.083542 kubelet[1620]: E0710 01:00:12.083518 1620 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 01:00:13.084127 kubelet[1620]: E0710 01:00:13.084061 1620 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 01:00:14.085123 kubelet[1620]: E0710 01:00:14.085088 1620 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 01:00:14.250951 env[1286]: time="2025-07-10T01:00:14.250919426Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.30.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 10 01:00:14.251956 env[1286]: time="2025-07-10T01:00:14.251934352Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:c7fd1cc652979d89a51bbcc125e28e90c9815c0bd8f922a5bd36eed4e1927c6d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 10 01:00:14.252984 env[1286]: time="2025-07-10T01:00:14.252970517Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.30.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 10 01:00:14.254229 env[1286]: time="2025-07-10T01:00:14.254211737Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:e570128aa8067a2f06b96d3cc98afa2e0a4b9790b435ee36ca051c8e72aeb8d0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 10 01:00:14.254366 env[1286]: time="2025-07-10T01:00:14.254345003Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.30.2\" returns image reference \"sha256:c7fd1cc652979d89a51bbcc125e28e90c9815c0bd8f922a5bd36eed4e1927c6d\"" Jul 10 01:00:14.255962 env[1286]: time="2025-07-10T01:00:14.255938282Z" level=info msg="CreateContainer within sandbox \"81ce65593d66ae89d14ff4e2d7c22b2ae06740d7771ebc5b47ffc184c1a028b8\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" Jul 10 01:00:14.263498 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3198716293.mount: Deactivated successfully. Jul 10 01:00:14.266403 env[1286]: time="2025-07-10T01:00:14.266377525Z" level=info msg="CreateContainer within sandbox \"81ce65593d66ae89d14ff4e2d7c22b2ae06740d7771ebc5b47ffc184c1a028b8\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"320d999223291c22566ab04a3d8ece42ad544cbd00e18415019a93624cc1680e\"" Jul 10 01:00:14.266783 env[1286]: time="2025-07-10T01:00:14.266770999Z" level=info msg="StartContainer for \"320d999223291c22566ab04a3d8ece42ad544cbd00e18415019a93624cc1680e\"" Jul 10 01:00:14.285822 systemd[1]: Started cri-containerd-320d999223291c22566ab04a3d8ece42ad544cbd00e18415019a93624cc1680e.scope. Jul 10 01:00:14.304743 kernel: kauditd_printk_skb: 50 callbacks suppressed Jul 10 01:00:14.304845 kernel: audit: type=1400 audit(1752109214.296:663): avc: denied { perfmon } for pid=2551 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:14.304867 kernel: audit: type=1300 audit(1752109214.296:663): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f9fcdef25f8 items=0 ppid=2485 pid=2551 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 01:00:14.296000 audit[2551]: AVC avc: denied { perfmon } for pid=2551 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:14.296000 audit[2551]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f9fcdef25f8 items=0 ppid=2485 pid=2551 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 01:00:14.308340 kernel: audit: type=1327 audit(1752109214.296:663): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3332306439393932323332393163323235363661623034613364386563 Jul 10 01:00:14.296000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3332306439393932323332393163323235363661623034613364386563 Jul 10 01:00:14.297000 audit[2551]: AVC avc: denied { bpf } for pid=2551 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:14.313517 kernel: audit: type=1400 audit(1752109214.297:664): avc: denied { bpf } for pid=2551 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:14.313554 kernel: audit: type=1400 audit(1752109214.297:664): avc: denied { bpf } for pid=2551 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:14.297000 audit[2551]: AVC avc: denied { bpf } for pid=2551 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:14.315954 kernel: audit: type=1400 audit(1752109214.297:664): avc: denied { bpf } for pid=2551 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:14.297000 audit[2551]: AVC avc: denied { bpf } for pid=2551 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:14.318776 kernel: audit: type=1400 audit(1752109214.297:664): avc: denied { perfmon } for pid=2551 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:14.297000 audit[2551]: AVC avc: denied { perfmon } for pid=2551 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:14.297000 audit[2551]: AVC avc: denied { perfmon } for pid=2551 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:14.322459 kernel: audit: type=1400 audit(1752109214.297:664): avc: denied { perfmon } for pid=2551 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:14.297000 audit[2551]: AVC avc: denied { perfmon } for pid=2551 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:14.297000 audit[2551]: AVC avc: denied { perfmon } for pid=2551 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:14.327697 kernel: audit: type=1400 audit(1752109214.297:664): avc: denied { perfmon } for pid=2551 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:14.327733 kernel: audit: type=1400 audit(1752109214.297:664): avc: denied { perfmon } for pid=2551 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:14.297000 audit[2551]: AVC avc: denied { perfmon } for pid=2551 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:14.297000 audit[2551]: AVC avc: denied { bpf } for pid=2551 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:14.297000 audit[2551]: AVC avc: denied { bpf } for pid=2551 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:14.297000 audit: BPF prog-id=104 op=LOAD Jul 10 01:00:14.297000 audit[2551]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c00030c008 items=0 ppid=2485 pid=2551 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 01:00:14.297000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3332306439393932323332393163323235363661623034613364386563 Jul 10 01:00:14.303000 audit[2551]: AVC avc: denied { bpf } for pid=2551 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:14.303000 audit[2551]: AVC avc: denied { bpf } for pid=2551 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:14.303000 audit[2551]: AVC avc: denied { perfmon } for pid=2551 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:14.303000 audit[2551]: AVC avc: denied { perfmon } for pid=2551 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:14.303000 audit[2551]: AVC avc: denied { perfmon } for pid=2551 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:14.303000 audit[2551]: AVC avc: denied { perfmon } for pid=2551 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:14.303000 audit[2551]: AVC avc: denied { perfmon } for pid=2551 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:14.303000 audit[2551]: AVC avc: denied { bpf } for pid=2551 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:14.303000 audit[2551]: AVC avc: denied { bpf } for pid=2551 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:14.303000 audit: BPF prog-id=105 op=LOAD Jul 10 01:00:14.303000 audit[2551]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c00030c058 items=0 ppid=2485 pid=2551 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 01:00:14.303000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3332306439393932323332393163323235363661623034613364386563 Jul 10 01:00:14.303000 audit: BPF prog-id=105 op=UNLOAD Jul 10 01:00:14.303000 audit: BPF prog-id=104 op=UNLOAD Jul 10 01:00:14.303000 audit[2551]: AVC avc: denied { bpf } for pid=2551 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:14.303000 audit[2551]: AVC avc: denied { bpf } for pid=2551 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:14.303000 audit[2551]: AVC avc: denied { bpf } for pid=2551 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:14.303000 audit[2551]: AVC avc: denied { perfmon } for pid=2551 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:14.303000 audit[2551]: AVC avc: denied { perfmon } for pid=2551 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:14.303000 audit[2551]: AVC avc: denied { perfmon } for pid=2551 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:14.303000 audit[2551]: AVC avc: denied { perfmon } for pid=2551 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:14.303000 audit[2551]: AVC avc: denied { perfmon } for pid=2551 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:14.303000 audit[2551]: AVC avc: denied { bpf } for pid=2551 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:14.303000 audit[2551]: AVC avc: denied { bpf } for pid=2551 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:14.303000 audit: BPF prog-id=106 op=LOAD Jul 10 01:00:14.303000 audit[2551]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c00030c0e8 items=0 ppid=2485 pid=2551 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 01:00:14.303000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3332306439393932323332393163323235363661623034613364386563 Jul 10 01:00:14.332173 env[1286]: time="2025-07-10T01:00:14.332140814Z" level=info msg="StartContainer for \"320d999223291c22566ab04a3d8ece42ad544cbd00e18415019a93624cc1680e\" returns successfully" Jul 10 01:00:14.333111 env[1286]: time="2025-07-10T01:00:14.333092552Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.2\"" Jul 10 01:00:15.085753 kubelet[1620]: E0710 01:00:15.085732 1620 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 01:00:15.262008 systemd[1]: run-containerd-runc-k8s.io-320d999223291c22566ab04a3d8ece42ad544cbd00e18415019a93624cc1680e-runc.VVvHfx.mount: Deactivated successfully. Jul 10 01:00:15.888123 systemd[1]: Created slice kubepods-besteffort-poda9b22119_8761_43b5_a85d_ed1f89b054c0.slice. Jul 10 01:00:15.981705 kubelet[1620]: I0710 01:00:15.981673 1620 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-2hc6t\" (UniqueName: \"kubernetes.io/projected/a9b22119-8761-43b5-a85d-ed1f89b054c0-kube-api-access-2hc6t\") pod \"nginx-deployment-7fcdb87857-l22fc\" (UID: \"a9b22119-8761-43b5-a85d-ed1f89b054c0\") " pod="default/nginx-deployment-7fcdb87857-l22fc" Jul 10 01:00:16.086139 kubelet[1620]: E0710 01:00:16.086112 1620 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 01:00:16.190257 env[1286]: time="2025-07-10T01:00:16.190173740Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-7fcdb87857-l22fc,Uid:a9b22119-8761-43b5-a85d-ed1f89b054c0,Namespace:default,Attempt:0,}" Jul 10 01:00:16.363941 systemd-networkd[1081]: calif0ac1a036f6: Link UP Jul 10 01:00:16.366229 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Jul 10 01:00:16.366277 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calif0ac1a036f6: link becomes ready Jul 10 01:00:16.366352 systemd-networkd[1081]: calif0ac1a036f6: Gained carrier Jul 10 01:00:16.373206 env[1286]: 2025-07-10 01:00:16.276 [INFO][2578] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.67.124.135-k8s-nginx--deployment--7fcdb87857--l22fc-eth0 nginx-deployment-7fcdb87857- default a9b22119-8761-43b5-a85d-ed1f89b054c0 1349 0 2025-07-10 01:00:15 +0000 UTC map[app:nginx pod-template-hash:7fcdb87857 projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 10.67.124.135 nginx-deployment-7fcdb87857-l22fc eth0 default [] [] [kns.default ksa.default.default] calif0ac1a036f6 [] [] }} ContainerID="2bea99cc1d32ec9af6b2f48f422136df3f255321801f8f03d21f564ba7556d8b" Namespace="default" Pod="nginx-deployment-7fcdb87857-l22fc" WorkloadEndpoint="10.67.124.135-k8s-nginx--deployment--7fcdb87857--l22fc-" Jul 10 01:00:16.373206 env[1286]: 2025-07-10 01:00:16.277 [INFO][2578] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="2bea99cc1d32ec9af6b2f48f422136df3f255321801f8f03d21f564ba7556d8b" Namespace="default" Pod="nginx-deployment-7fcdb87857-l22fc" WorkloadEndpoint="10.67.124.135-k8s-nginx--deployment--7fcdb87857--l22fc-eth0" Jul 10 01:00:16.373206 env[1286]: 2025-07-10 01:00:16.296 [INFO][2592] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="2bea99cc1d32ec9af6b2f48f422136df3f255321801f8f03d21f564ba7556d8b" HandleID="k8s-pod-network.2bea99cc1d32ec9af6b2f48f422136df3f255321801f8f03d21f564ba7556d8b" Workload="10.67.124.135-k8s-nginx--deployment--7fcdb87857--l22fc-eth0" Jul 10 01:00:16.373206 env[1286]: 2025-07-10 01:00:16.296 [INFO][2592] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="2bea99cc1d32ec9af6b2f48f422136df3f255321801f8f03d21f564ba7556d8b" HandleID="k8s-pod-network.2bea99cc1d32ec9af6b2f48f422136df3f255321801f8f03d21f564ba7556d8b" Workload="10.67.124.135-k8s-nginx--deployment--7fcdb87857--l22fc-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002d50a0), Attrs:map[string]string{"namespace":"default", "node":"10.67.124.135", "pod":"nginx-deployment-7fcdb87857-l22fc", "timestamp":"2025-07-10 01:00:16.296500269 +0000 UTC"}, Hostname:"10.67.124.135", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Jul 10 01:00:16.373206 env[1286]: 2025-07-10 01:00:16.296 [INFO][2592] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Jul 10 01:00:16.373206 env[1286]: 2025-07-10 01:00:16.296 [INFO][2592] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Jul 10 01:00:16.373206 env[1286]: 2025-07-10 01:00:16.296 [INFO][2592] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.67.124.135' Jul 10 01:00:16.373206 env[1286]: 2025-07-10 01:00:16.316 [INFO][2592] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.2bea99cc1d32ec9af6b2f48f422136df3f255321801f8f03d21f564ba7556d8b" host="10.67.124.135" Jul 10 01:00:16.373206 env[1286]: 2025-07-10 01:00:16.323 [INFO][2592] ipam/ipam.go 394: Looking up existing affinities for host host="10.67.124.135" Jul 10 01:00:16.373206 env[1286]: 2025-07-10 01:00:16.327 [INFO][2592] ipam/ipam.go 511: Trying affinity for 192.168.53.128/26 host="10.67.124.135" Jul 10 01:00:16.373206 env[1286]: 2025-07-10 01:00:16.329 [INFO][2592] ipam/ipam.go 158: Attempting to load block cidr=192.168.53.128/26 host="10.67.124.135" Jul 10 01:00:16.373206 env[1286]: 2025-07-10 01:00:16.333 [INFO][2592] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.53.128/26 host="10.67.124.135" Jul 10 01:00:16.373206 env[1286]: 2025-07-10 01:00:16.333 [INFO][2592] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.53.128/26 handle="k8s-pod-network.2bea99cc1d32ec9af6b2f48f422136df3f255321801f8f03d21f564ba7556d8b" host="10.67.124.135" Jul 10 01:00:16.373206 env[1286]: 2025-07-10 01:00:16.335 [INFO][2592] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.2bea99cc1d32ec9af6b2f48f422136df3f255321801f8f03d21f564ba7556d8b Jul 10 01:00:16.373206 env[1286]: 2025-07-10 01:00:16.343 [INFO][2592] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.53.128/26 handle="k8s-pod-network.2bea99cc1d32ec9af6b2f48f422136df3f255321801f8f03d21f564ba7556d8b" host="10.67.124.135" Jul 10 01:00:16.373206 env[1286]: 2025-07-10 01:00:16.358 [INFO][2592] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.53.130/26] block=192.168.53.128/26 handle="k8s-pod-network.2bea99cc1d32ec9af6b2f48f422136df3f255321801f8f03d21f564ba7556d8b" host="10.67.124.135" Jul 10 01:00:16.373206 env[1286]: 2025-07-10 01:00:16.358 [INFO][2592] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.53.130/26] handle="k8s-pod-network.2bea99cc1d32ec9af6b2f48f422136df3f255321801f8f03d21f564ba7556d8b" host="10.67.124.135" Jul 10 01:00:16.373206 env[1286]: 2025-07-10 01:00:16.358 [INFO][2592] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Jul 10 01:00:16.373206 env[1286]: 2025-07-10 01:00:16.358 [INFO][2592] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.53.130/26] IPv6=[] ContainerID="2bea99cc1d32ec9af6b2f48f422136df3f255321801f8f03d21f564ba7556d8b" HandleID="k8s-pod-network.2bea99cc1d32ec9af6b2f48f422136df3f255321801f8f03d21f564ba7556d8b" Workload="10.67.124.135-k8s-nginx--deployment--7fcdb87857--l22fc-eth0" Jul 10 01:00:16.373769 env[1286]: 2025-07-10 01:00:16.360 [INFO][2578] cni-plugin/k8s.go 418: Populated endpoint ContainerID="2bea99cc1d32ec9af6b2f48f422136df3f255321801f8f03d21f564ba7556d8b" Namespace="default" Pod="nginx-deployment-7fcdb87857-l22fc" WorkloadEndpoint="10.67.124.135-k8s-nginx--deployment--7fcdb87857--l22fc-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.67.124.135-k8s-nginx--deployment--7fcdb87857--l22fc-eth0", GenerateName:"nginx-deployment-7fcdb87857-", Namespace:"default", SelfLink:"", UID:"a9b22119-8761-43b5-a85d-ed1f89b054c0", ResourceVersion:"1349", Generation:0, CreationTimestamp:time.Date(2025, time.July, 10, 1, 0, 15, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"7fcdb87857", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.67.124.135", ContainerID:"", Pod:"nginx-deployment-7fcdb87857-l22fc", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.53.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"calif0ac1a036f6", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Jul 10 01:00:16.373769 env[1286]: 2025-07-10 01:00:16.360 [INFO][2578] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.53.130/32] ContainerID="2bea99cc1d32ec9af6b2f48f422136df3f255321801f8f03d21f564ba7556d8b" Namespace="default" Pod="nginx-deployment-7fcdb87857-l22fc" WorkloadEndpoint="10.67.124.135-k8s-nginx--deployment--7fcdb87857--l22fc-eth0" Jul 10 01:00:16.373769 env[1286]: 2025-07-10 01:00:16.360 [INFO][2578] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calif0ac1a036f6 ContainerID="2bea99cc1d32ec9af6b2f48f422136df3f255321801f8f03d21f564ba7556d8b" Namespace="default" Pod="nginx-deployment-7fcdb87857-l22fc" WorkloadEndpoint="10.67.124.135-k8s-nginx--deployment--7fcdb87857--l22fc-eth0" Jul 10 01:00:16.373769 env[1286]: 2025-07-10 01:00:16.366 [INFO][2578] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="2bea99cc1d32ec9af6b2f48f422136df3f255321801f8f03d21f564ba7556d8b" Namespace="default" Pod="nginx-deployment-7fcdb87857-l22fc" WorkloadEndpoint="10.67.124.135-k8s-nginx--deployment--7fcdb87857--l22fc-eth0" Jul 10 01:00:16.373769 env[1286]: 2025-07-10 01:00:16.367 [INFO][2578] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="2bea99cc1d32ec9af6b2f48f422136df3f255321801f8f03d21f564ba7556d8b" Namespace="default" Pod="nginx-deployment-7fcdb87857-l22fc" WorkloadEndpoint="10.67.124.135-k8s-nginx--deployment--7fcdb87857--l22fc-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.67.124.135-k8s-nginx--deployment--7fcdb87857--l22fc-eth0", GenerateName:"nginx-deployment-7fcdb87857-", Namespace:"default", SelfLink:"", UID:"a9b22119-8761-43b5-a85d-ed1f89b054c0", ResourceVersion:"1349", Generation:0, CreationTimestamp:time.Date(2025, time.July, 10, 1, 0, 15, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"7fcdb87857", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.67.124.135", ContainerID:"2bea99cc1d32ec9af6b2f48f422136df3f255321801f8f03d21f564ba7556d8b", Pod:"nginx-deployment-7fcdb87857-l22fc", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.53.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"calif0ac1a036f6", MAC:"6a:86:2d:68:b7:0d", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Jul 10 01:00:16.373769 env[1286]: 2025-07-10 01:00:16.371 [INFO][2578] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="2bea99cc1d32ec9af6b2f48f422136df3f255321801f8f03d21f564ba7556d8b" Namespace="default" Pod="nginx-deployment-7fcdb87857-l22fc" WorkloadEndpoint="10.67.124.135-k8s-nginx--deployment--7fcdb87857--l22fc-eth0" Jul 10 01:00:16.382135 env[1286]: time="2025-07-10T01:00:16.381973392Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 10 01:00:16.382135 env[1286]: time="2025-07-10T01:00:16.382011444Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 10 01:00:16.382135 env[1286]: time="2025-07-10T01:00:16.382026276Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 10 01:00:16.382284 env[1286]: time="2025-07-10T01:00:16.382158898Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/2bea99cc1d32ec9af6b2f48f422136df3f255321801f8f03d21f564ba7556d8b pid=2613 runtime=io.containerd.runc.v2 Jul 10 01:00:16.394482 systemd[1]: run-containerd-runc-k8s.io-2bea99cc1d32ec9af6b2f48f422136df3f255321801f8f03d21f564ba7556d8b-runc.Zmfx5h.mount: Deactivated successfully. Jul 10 01:00:16.400163 systemd[1]: Started cri-containerd-2bea99cc1d32ec9af6b2f48f422136df3f255321801f8f03d21f564ba7556d8b.scope. Jul 10 01:00:16.409000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:16.409000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:16.409000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:16.409000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:16.409000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:16.409000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:16.409000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:16.409000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:16.409000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:16.409000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:16.409000 audit: BPF prog-id=107 op=LOAD Jul 10 01:00:16.410000 audit[2622]: AVC avc: denied { bpf } for pid=2622 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:16.410000 audit[2622]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2613 pid=2622 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 01:00:16.410000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3262656139396363316433326563396166366232663438663432323133 Jul 10 01:00:16.410000 audit[2622]: AVC avc: denied { perfmon } for pid=2622 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:16.410000 audit[2622]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=2613 pid=2622 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 01:00:16.410000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3262656139396363316433326563396166366232663438663432323133 Jul 10 01:00:16.410000 audit[2622]: AVC avc: denied { bpf } for pid=2622 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:16.410000 audit[2622]: AVC avc: denied { bpf } for pid=2622 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:16.410000 audit[2622]: AVC avc: denied { bpf } for pid=2622 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:16.410000 audit[2622]: AVC avc: denied { perfmon } for pid=2622 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:16.410000 audit[2622]: AVC avc: denied { perfmon } for pid=2622 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:16.410000 audit[2622]: AVC avc: denied { perfmon } for pid=2622 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:16.410000 audit[2622]: AVC avc: denied { perfmon } for pid=2622 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:16.410000 audit[2622]: AVC avc: denied { perfmon } for pid=2622 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:16.410000 audit[2622]: AVC avc: denied { bpf } for pid=2622 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:16.410000 audit[2622]: AVC avc: denied { bpf } for pid=2622 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:16.410000 audit: BPF prog-id=108 op=LOAD Jul 10 01:00:16.410000 audit[2622]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c00021ca20 items=0 ppid=2613 pid=2622 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 01:00:16.410000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3262656139396363316433326563396166366232663438663432323133 Jul 10 01:00:16.410000 audit[2622]: AVC avc: denied { bpf } for pid=2622 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:16.410000 audit[2622]: AVC avc: denied { bpf } for pid=2622 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:16.410000 audit[2622]: AVC avc: denied { perfmon } for pid=2622 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:16.410000 audit[2622]: AVC avc: denied { perfmon } for pid=2622 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:16.410000 audit[2622]: AVC avc: denied { perfmon } for pid=2622 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:16.410000 audit[2622]: AVC avc: denied { perfmon } for pid=2622 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:16.410000 audit[2622]: AVC avc: denied { perfmon } for pid=2622 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:16.410000 audit[2622]: AVC avc: denied { bpf } for pid=2622 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:16.410000 audit[2622]: AVC avc: denied { bpf } for pid=2622 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:16.410000 audit: BPF prog-id=109 op=LOAD Jul 10 01:00:16.410000 audit[2622]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c00021ca68 items=0 ppid=2613 pid=2622 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 01:00:16.410000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3262656139396363316433326563396166366232663438663432323133 Jul 10 01:00:16.410000 audit: BPF prog-id=109 op=UNLOAD Jul 10 01:00:16.410000 audit: BPF prog-id=108 op=UNLOAD Jul 10 01:00:16.410000 audit[2622]: AVC avc: denied { bpf } for pid=2622 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:16.410000 audit[2622]: AVC avc: denied { bpf } for pid=2622 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:16.410000 audit[2622]: AVC avc: denied { bpf } for pid=2622 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:16.410000 audit[2622]: AVC avc: denied { perfmon } for pid=2622 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:16.410000 audit[2622]: AVC avc: denied { perfmon } for pid=2622 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:16.410000 audit[2622]: AVC avc: denied { perfmon } for pid=2622 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:16.410000 audit[2622]: AVC avc: denied { perfmon } for pid=2622 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:16.410000 audit[2622]: AVC avc: denied { perfmon } for pid=2622 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:16.410000 audit[2622]: AVC avc: denied { bpf } for pid=2622 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:16.410000 audit[2622]: AVC avc: denied { bpf } for pid=2622 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:16.410000 audit: BPF prog-id=110 op=LOAD Jul 10 01:00:16.410000 audit[2622]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c00021ce78 items=0 ppid=2613 pid=2622 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 01:00:16.410000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3262656139396363316433326563396166366232663438663432323133 Jul 10 01:00:16.411960 systemd-resolved[1222]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Jul 10 01:00:16.435330 env[1286]: time="2025-07-10T01:00:16.434276114Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-7fcdb87857-l22fc,Uid:a9b22119-8761-43b5-a85d-ed1f89b054c0,Namespace:default,Attempt:0,} returns sandbox id \"2bea99cc1d32ec9af6b2f48f422136df3f255321801f8f03d21f564ba7556d8b\"" Jul 10 01:00:16.438000 audit[2650]: NETFILTER_CFG table=filter:70 family=2 entries=42 op=nft_register_chain pid=2650 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 10 01:00:16.438000 audit[2650]: SYSCALL arch=c000003e syscall=46 success=yes exit=22512 a0=3 a1=7ffee3f99210 a2=0 a3=7ffee3f991fc items=0 ppid=2255 pid=2650 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 01:00:16.438000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 10 01:00:17.086816 kubelet[1620]: E0710 01:00:17.086783 1620 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 01:00:17.432562 systemd-networkd[1081]: calif0ac1a036f6: Gained IPv6LL Jul 10 01:00:18.088075 kubelet[1620]: E0710 01:00:18.088050 1620 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 01:00:19.088908 kubelet[1620]: E0710 01:00:19.088873 1620 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 01:00:19.684542 env[1286]: time="2025-07-10T01:00:19.684512922Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.30.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 10 01:00:19.686832 env[1286]: time="2025-07-10T01:00:19.686811466Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:9e48822a4fe26f4ed9231b361fdd1357ea3567f1fc0a8db4d616622fe570a866,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 10 01:00:19.688313 env[1286]: time="2025-07-10T01:00:19.688299690Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.30.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 10 01:00:19.689453 env[1286]: time="2025-07-10T01:00:19.689440140Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:8fec2de12dfa51bae89d941938a07af2598eb8bfcab55d0dded1d9c193d7b99f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 10 01:00:19.689781 env[1286]: time="2025-07-10T01:00:19.689766329Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.2\" returns image reference \"sha256:9e48822a4fe26f4ed9231b361fdd1357ea3567f1fc0a8db4d616622fe570a866\"" Jul 10 01:00:19.690954 env[1286]: time="2025-07-10T01:00:19.690936607Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" Jul 10 01:00:19.691590 env[1286]: time="2025-07-10T01:00:19.691574472Z" level=info msg="CreateContainer within sandbox \"81ce65593d66ae89d14ff4e2d7c22b2ae06740d7771ebc5b47ffc184c1a028b8\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" Jul 10 01:00:19.700850 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2796536077.mount: Deactivated successfully. Jul 10 01:00:19.705041 env[1286]: time="2025-07-10T01:00:19.705014495Z" level=info msg="CreateContainer within sandbox \"81ce65593d66ae89d14ff4e2d7c22b2ae06740d7771ebc5b47ffc184c1a028b8\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"29b9fc7edaa5a7673ff553f5861cd5646ecf9123b86fcfb7a158c08cf18129ae\"" Jul 10 01:00:19.705362 env[1286]: time="2025-07-10T01:00:19.705348393Z" level=info msg="StartContainer for \"29b9fc7edaa5a7673ff553f5861cd5646ecf9123b86fcfb7a158c08cf18129ae\"" Jul 10 01:00:19.719379 systemd[1]: Started cri-containerd-29b9fc7edaa5a7673ff553f5861cd5646ecf9123b86fcfb7a158c08cf18129ae.scope. Jul 10 01:00:19.738063 kernel: kauditd_printk_skb: 93 callbacks suppressed Jul 10 01:00:19.738130 kernel: audit: type=1400 audit(1752109219.730:688): avc: denied { perfmon } for pid=2662 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:19.738151 kernel: audit: type=1300 audit(1752109219.730:688): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001476b0 a2=3c a3=7f49750a82f8 items=0 ppid=2485 pid=2662 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 01:00:19.730000 audit[2662]: AVC avc: denied { perfmon } for pid=2662 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:19.730000 audit[2662]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001476b0 a2=3c a3=7f49750a82f8 items=0 ppid=2485 pid=2662 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 01:00:19.741618 kernel: audit: type=1327 audit(1752109219.730:688): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3239623966633765646161356137363733666635353366353836316364 Jul 10 01:00:19.730000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3239623966633765646161356137363733666635353366353836316364 Jul 10 01:00:19.730000 audit[2662]: AVC avc: denied { bpf } for pid=2662 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:19.744208 kernel: audit: type=1400 audit(1752109219.730:689): avc: denied { bpf } for pid=2662 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:19.744238 kernel: audit: type=1400 audit(1752109219.730:689): avc: denied { bpf } for pid=2662 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:19.730000 audit[2662]: AVC avc: denied { bpf } for pid=2662 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:19.730000 audit[2662]: AVC avc: denied { bpf } for pid=2662 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:19.753696 kernel: audit: type=1400 audit(1752109219.730:689): avc: denied { bpf } for pid=2662 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:19.753727 kernel: audit: type=1400 audit(1752109219.730:689): avc: denied { perfmon } for pid=2662 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:19.753743 kernel: audit: type=1400 audit(1752109219.730:689): avc: denied { perfmon } for pid=2662 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:19.753756 kernel: audit: type=1400 audit(1752109219.730:689): avc: denied { perfmon } for pid=2662 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:19.730000 audit[2662]: AVC avc: denied { perfmon } for pid=2662 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:19.730000 audit[2662]: AVC avc: denied { perfmon } for pid=2662 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:19.730000 audit[2662]: AVC avc: denied { perfmon } for pid=2662 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:19.730000 audit[2662]: AVC avc: denied { perfmon } for pid=2662 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:19.758468 kernel: audit: type=1400 audit(1752109219.730:689): avc: denied { perfmon } for pid=2662 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:19.730000 audit[2662]: AVC avc: denied { perfmon } for pid=2662 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:19.730000 audit[2662]: AVC avc: denied { bpf } for pid=2662 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:19.730000 audit[2662]: AVC avc: denied { bpf } for pid=2662 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:19.730000 audit: BPF prog-id=111 op=LOAD Jul 10 01:00:19.730000 audit[2662]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001479d8 a2=78 a3=c000024e78 items=0 ppid=2485 pid=2662 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 01:00:19.730000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3239623966633765646161356137363733666635353366353836316364 Jul 10 01:00:19.734000 audit[2662]: AVC avc: denied { bpf } for pid=2662 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:19.734000 audit[2662]: AVC avc: denied { bpf } for pid=2662 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:19.734000 audit[2662]: AVC avc: denied { perfmon } for pid=2662 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:19.734000 audit[2662]: AVC avc: denied { perfmon } for pid=2662 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:19.734000 audit[2662]: AVC avc: denied { perfmon } for pid=2662 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:19.734000 audit[2662]: AVC avc: denied { perfmon } for pid=2662 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:19.734000 audit[2662]: AVC avc: denied { perfmon } for pid=2662 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:19.734000 audit[2662]: AVC avc: denied { bpf } for pid=2662 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:19.734000 audit[2662]: AVC avc: denied { bpf } for pid=2662 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:19.734000 audit: BPF prog-id=112 op=LOAD Jul 10 01:00:19.734000 audit[2662]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000147770 a2=78 a3=c000024ec8 items=0 ppid=2485 pid=2662 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 01:00:19.734000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3239623966633765646161356137363733666635353366353836316364 Jul 10 01:00:19.737000 audit: BPF prog-id=112 op=UNLOAD Jul 10 01:00:19.737000 audit: BPF prog-id=111 op=UNLOAD Jul 10 01:00:19.737000 audit[2662]: AVC avc: denied { bpf } for pid=2662 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:19.737000 audit[2662]: AVC avc: denied { bpf } for pid=2662 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:19.737000 audit[2662]: AVC avc: denied { bpf } for pid=2662 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:19.737000 audit[2662]: AVC avc: denied { perfmon } for pid=2662 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:19.737000 audit[2662]: AVC avc: denied { perfmon } for pid=2662 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:19.737000 audit[2662]: AVC avc: denied { perfmon } for pid=2662 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:19.737000 audit[2662]: AVC avc: denied { perfmon } for pid=2662 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:19.737000 audit[2662]: AVC avc: denied { perfmon } for pid=2662 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:19.737000 audit[2662]: AVC avc: denied { bpf } for pid=2662 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:19.737000 audit[2662]: AVC avc: denied { bpf } for pid=2662 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:19.737000 audit: BPF prog-id=113 op=LOAD Jul 10 01:00:19.737000 audit[2662]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000147c30 a2=78 a3=c000024f58 items=0 ppid=2485 pid=2662 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 01:00:19.737000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3239623966633765646161356137363733666635353366353836316364 Jul 10 01:00:19.766359 env[1286]: time="2025-07-10T01:00:19.766334286Z" level=info msg="StartContainer for \"29b9fc7edaa5a7673ff553f5861cd5646ecf9123b86fcfb7a158c08cf18129ae\" returns successfully" Jul 10 01:00:20.089996 kubelet[1620]: E0710 01:00:20.089979 1620 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 01:00:20.150715 kubelet[1620]: I0710 01:00:20.150682 1620 csi_plugin.go:100] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 Jul 10 01:00:20.150715 kubelet[1620]: I0710 01:00:20.150714 1620 csi_plugin.go:113] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock Jul 10 01:00:21.052753 kubelet[1620]: E0710 01:00:21.052727 1620 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 01:00:21.090494 kubelet[1620]: E0710 01:00:21.090441 1620 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 01:00:22.091064 kubelet[1620]: E0710 01:00:22.091035 1620 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 01:00:23.091815 kubelet[1620]: E0710 01:00:23.091790 1620 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 01:00:23.114000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-139.178.70.103:22-185.156.73.234:39300 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 01:00:23.115195 systemd[1]: Started sshd@7-139.178.70.103:22-185.156.73.234:39300.service. Jul 10 01:00:24.092195 kubelet[1620]: E0710 01:00:24.092131 1620 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 01:00:25.092986 kubelet[1620]: E0710 01:00:25.092954 1620 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 01:00:25.584489 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount234019489.mount: Deactivated successfully. Jul 10 01:00:26.093200 kubelet[1620]: E0710 01:00:26.093169 1620 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 01:00:26.667616 env[1286]: time="2025-07-10T01:00:26.667568082Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 10 01:00:26.668923 env[1286]: time="2025-07-10T01:00:26.668902670Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:f6422896ca84c9af48d5417d6b7a573bf6b38f81edc15538907d987fc658d909,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 10 01:00:26.671867 env[1286]: time="2025-07-10T01:00:26.671839300Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 10 01:00:26.674095 env[1286]: time="2025-07-10T01:00:26.674074260Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx@sha256:30bb68e656e0665bce700e67d2756f68bdca3345fa1099a32bfdb8febcf621cd,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 10 01:00:26.674553 env[1286]: time="2025-07-10T01:00:26.674536212Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:f6422896ca84c9af48d5417d6b7a573bf6b38f81edc15538907d987fc658d909\"" Jul 10 01:00:26.676205 env[1286]: time="2025-07-10T01:00:26.676166790Z" level=info msg="CreateContainer within sandbox \"2bea99cc1d32ec9af6b2f48f422136df3f255321801f8f03d21f564ba7556d8b\" for container &ContainerMetadata{Name:nginx,Attempt:0,}" Jul 10 01:00:26.685285 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2588469421.mount: Deactivated successfully. Jul 10 01:00:26.688059 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1265802607.mount: Deactivated successfully. Jul 10 01:00:26.691150 env[1286]: time="2025-07-10T01:00:26.691121426Z" level=info msg="CreateContainer within sandbox \"2bea99cc1d32ec9af6b2f48f422136df3f255321801f8f03d21f564ba7556d8b\" for &ContainerMetadata{Name:nginx,Attempt:0,} returns container id \"fb77602901869ad55d09e4591d2aa8b05e82aaa1539c97100701d975919fbd43\"" Jul 10 01:00:26.691477 env[1286]: time="2025-07-10T01:00:26.691459457Z" level=info msg="StartContainer for \"fb77602901869ad55d09e4591d2aa8b05e82aaa1539c97100701d975919fbd43\"" Jul 10 01:00:26.704534 systemd[1]: Started cri-containerd-fb77602901869ad55d09e4591d2aa8b05e82aaa1539c97100701d975919fbd43.scope. Jul 10 01:00:26.724194 kernel: kauditd_printk_skb: 34 callbacks suppressed Jul 10 01:00:26.726750 kernel: audit: type=1400 audit(1752109226.715:695): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:26.726787 kernel: audit: type=1400 audit(1752109226.715:696): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:26.726809 kernel: audit: type=1400 audit(1752109226.715:697): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:26.726829 kernel: audit: type=1400 audit(1752109226.715:698): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:26.715000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:26.715000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:26.715000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:26.715000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:26.729569 kernel: audit: type=1400 audit(1752109226.715:699): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:26.715000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:26.732085 kernel: audit: type=1400 audit(1752109226.715:700): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:26.715000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:26.715000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:26.715000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:26.738685 kernel: audit: type=1400 audit(1752109226.715:701): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:26.738758 kernel: audit: type=1400 audit(1752109226.715:702): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:26.738780 kernel: audit: type=1400 audit(1752109226.715:703): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:26.715000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:26.715000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:26.745075 kernel: audit: type=1400 audit(1752109226.715:704): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:26.715000 audit: BPF prog-id=114 op=LOAD Jul 10 01:00:26.717000 audit[2714]: AVC avc: denied { bpf } for pid=2714 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:26.717000 audit[2714]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2613 pid=2714 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 01:00:26.717000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6662373736303239303138363961643535643039653435393164326161 Jul 10 01:00:26.717000 audit[2714]: AVC avc: denied { perfmon } for pid=2714 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:26.717000 audit[2714]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=2613 pid=2714 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 01:00:26.717000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6662373736303239303138363961643535643039653435393164326161 Jul 10 01:00:26.717000 audit[2714]: AVC avc: denied { bpf } for pid=2714 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:26.717000 audit[2714]: AVC avc: denied { bpf } for pid=2714 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:26.717000 audit[2714]: AVC avc: denied { bpf } for pid=2714 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:26.717000 audit[2714]: AVC avc: denied { perfmon } for pid=2714 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:26.717000 audit[2714]: AVC avc: denied { perfmon } for pid=2714 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:26.717000 audit[2714]: AVC avc: denied { perfmon } for pid=2714 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:26.717000 audit[2714]: AVC avc: denied { perfmon } for pid=2714 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:26.717000 audit[2714]: AVC avc: denied { perfmon } for pid=2714 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:26.717000 audit[2714]: AVC avc: denied { bpf } for pid=2714 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:26.717000 audit[2714]: AVC avc: denied { bpf } for pid=2714 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:26.717000 audit: BPF prog-id=115 op=LOAD Jul 10 01:00:26.717000 audit[2714]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0003660d0 items=0 ppid=2613 pid=2714 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 01:00:26.717000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6662373736303239303138363961643535643039653435393164326161 Jul 10 01:00:26.719000 audit[2714]: AVC avc: denied { bpf } for pid=2714 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:26.719000 audit[2714]: AVC avc: denied { bpf } for pid=2714 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:26.719000 audit[2714]: AVC avc: denied { perfmon } for pid=2714 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:26.719000 audit[2714]: AVC avc: denied { perfmon } for pid=2714 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:26.719000 audit[2714]: AVC avc: denied { perfmon } for pid=2714 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:26.719000 audit[2714]: AVC avc: denied { perfmon } for pid=2714 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:26.719000 audit[2714]: AVC avc: denied { perfmon } for pid=2714 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:26.719000 audit[2714]: AVC avc: denied { bpf } for pid=2714 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:26.719000 audit[2714]: AVC avc: denied { bpf } for pid=2714 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:26.719000 audit: BPF prog-id=116 op=LOAD Jul 10 01:00:26.719000 audit[2714]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000366118 items=0 ppid=2613 pid=2714 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 01:00:26.719000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6662373736303239303138363961643535643039653435393164326161 Jul 10 01:00:26.721000 audit: BPF prog-id=116 op=UNLOAD Jul 10 01:00:26.721000 audit: BPF prog-id=115 op=UNLOAD Jul 10 01:00:26.721000 audit[2714]: AVC avc: denied { bpf } for pid=2714 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:26.721000 audit[2714]: AVC avc: denied { bpf } for pid=2714 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:26.721000 audit[2714]: AVC avc: denied { bpf } for pid=2714 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:26.721000 audit[2714]: AVC avc: denied { perfmon } for pid=2714 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:26.721000 audit[2714]: AVC avc: denied { perfmon } for pid=2714 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:26.721000 audit[2714]: AVC avc: denied { perfmon } for pid=2714 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:26.721000 audit[2714]: AVC avc: denied { perfmon } for pid=2714 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:26.721000 audit[2714]: AVC avc: denied { perfmon } for pid=2714 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:26.721000 audit[2714]: AVC avc: denied { bpf } for pid=2714 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:26.721000 audit[2714]: AVC avc: denied { bpf } for pid=2714 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:26.721000 audit: BPF prog-id=117 op=LOAD Jul 10 01:00:26.721000 audit[2714]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000366528 items=0 ppid=2613 pid=2714 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 01:00:26.721000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6662373736303239303138363961643535643039653435393164326161 Jul 10 01:00:26.748556 env[1286]: time="2025-07-10T01:00:26.748529682Z" level=info msg="StartContainer for \"fb77602901869ad55d09e4591d2aa8b05e82aaa1539c97100701d975919fbd43\" returns successfully" Jul 10 01:00:26.937028 sshd[2702]: Invalid user carlos from 185.156.73.234 port 39300 Jul 10 01:00:27.093630 kubelet[1620]: E0710 01:00:27.093595 1620 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 01:00:27.407426 sshd[2702]: pam_faillock(sshd:auth): User unknown Jul 10 01:00:27.417284 sshd[2702]: pam_unix(sshd:auth): check pass; user unknown Jul 10 01:00:27.417305 sshd[2702]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.156.73.234 Jul 10 01:00:27.417620 sshd[2702]: pam_faillock(sshd:auth): User unknown Jul 10 01:00:27.417000 audit[2702]: USER_AUTH pid=2702 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="carlos" exe="/usr/sbin/sshd" hostname=185.156.73.234 addr=185.156.73.234 terminal=ssh res=failed' Jul 10 01:00:27.524704 kubelet[1620]: I0710 01:00:27.524657 1620 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/csi-node-driver-bfm74" podStartSLOduration=32.818669026 podStartE2EDuration="45.524644091s" podCreationTimestamp="2025-07-10 00:59:42 +0000 UTC" firstStartedPulling="2025-07-10 01:00:06.984557473 +0000 UTC m=+26.604301166" lastFinishedPulling="2025-07-10 01:00:19.690532536 +0000 UTC m=+39.310276231" observedRunningTime="2025-07-10 01:00:20.363551765 +0000 UTC m=+39.983295468" watchObservedRunningTime="2025-07-10 01:00:27.524644091 +0000 UTC m=+47.144387787" Jul 10 01:00:28.093717 kubelet[1620]: E0710 01:00:28.093682 1620 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 01:00:28.706917 sshd[2702]: Failed password for invalid user carlos from 185.156.73.234 port 39300 ssh2 Jul 10 01:00:29.094727 kubelet[1620]: E0710 01:00:29.094686 1620 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 01:00:29.292458 sshd[2702]: Connection closed by invalid user carlos 185.156.73.234 port 39300 [preauth] Jul 10 01:00:29.293153 systemd[1]: sshd@7-139.178.70.103:22-185.156.73.234:39300.service: Deactivated successfully. Jul 10 01:00:29.292000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-139.178.70.103:22-185.156.73.234:39300 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 01:00:30.095238 kubelet[1620]: E0710 01:00:30.095197 1620 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 01:00:30.215264 systemd[1]: run-containerd-runc-k8s.io-4627b58e82075f31fee1a01ca11701b9cec5ea1b58922d10114e451441294b1d-runc.rpwc12.mount: Deactivated successfully. Jul 10 01:00:30.702683 kubelet[1620]: I0710 01:00:30.702507 1620 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="default/nginx-deployment-7fcdb87857-l22fc" podStartSLOduration=5.463076665 podStartE2EDuration="15.702485243s" podCreationTimestamp="2025-07-10 01:00:15 +0000 UTC" firstStartedPulling="2025-07-10 01:00:16.435943898 +0000 UTC m=+36.055687592" lastFinishedPulling="2025-07-10 01:00:26.675352476 +0000 UTC m=+46.295096170" observedRunningTime="2025-07-10 01:00:27.532479259 +0000 UTC m=+47.152222961" watchObservedRunningTime="2025-07-10 01:00:30.702485243 +0000 UTC m=+50.322228945" Jul 10 01:00:31.095826 kubelet[1620]: E0710 01:00:31.095803 1620 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 01:00:32.097040 kubelet[1620]: E0710 01:00:32.096997 1620 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 01:00:33.098116 kubelet[1620]: E0710 01:00:33.098093 1620 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 01:00:34.098690 kubelet[1620]: E0710 01:00:34.098665 1620 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 01:00:35.099948 kubelet[1620]: E0710 01:00:35.099907 1620 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 01:00:36.100461 kubelet[1620]: E0710 01:00:36.100430 1620 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 01:00:37.101074 kubelet[1620]: E0710 01:00:37.101047 1620 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 01:00:38.102174 kubelet[1620]: E0710 01:00:38.102149 1620 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 01:00:39.103317 kubelet[1620]: E0710 01:00:39.103291 1620 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 01:00:40.103909 kubelet[1620]: E0710 01:00:40.103879 1620 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 01:00:41.052496 kubelet[1620]: E0710 01:00:41.052465 1620 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 01:00:41.077705 env[1286]: time="2025-07-10T01:00:41.077463551Z" level=info msg="StopPodSandbox for \"34764dfbe2bcfa7c27deac9036fcf32920e6740c56f3a4e57f377c66f514490b\"" Jul 10 01:00:41.104938 kubelet[1620]: E0710 01:00:41.104904 1620 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 01:00:41.282207 env[1286]: 2025-07-10 01:00:41.250 [WARNING][2795] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="34764dfbe2bcfa7c27deac9036fcf32920e6740c56f3a4e57f377c66f514490b" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.67.124.135-k8s-csi--node--driver--bfm74-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"f8539811-5553-42c4-b972-5bfd95d2de66", ResourceVersion:"1363", Generation:0, CreationTimestamp:time.Date(2025, time.July, 10, 0, 59, 42, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"8967bcb6f", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.67.124.135", ContainerID:"81ce65593d66ae89d14ff4e2d7c22b2ae06740d7771ebc5b47ffc184c1a028b8", Pod:"csi-node-driver-bfm74", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.53.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"calic6b2b40d61a", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Jul 10 01:00:41.282207 env[1286]: 2025-07-10 01:00:41.250 [INFO][2795] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="34764dfbe2bcfa7c27deac9036fcf32920e6740c56f3a4e57f377c66f514490b" Jul 10 01:00:41.282207 env[1286]: 2025-07-10 01:00:41.250 [INFO][2795] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="34764dfbe2bcfa7c27deac9036fcf32920e6740c56f3a4e57f377c66f514490b" iface="eth0" netns="" Jul 10 01:00:41.282207 env[1286]: 2025-07-10 01:00:41.250 [INFO][2795] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="34764dfbe2bcfa7c27deac9036fcf32920e6740c56f3a4e57f377c66f514490b" Jul 10 01:00:41.282207 env[1286]: 2025-07-10 01:00:41.251 [INFO][2795] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="34764dfbe2bcfa7c27deac9036fcf32920e6740c56f3a4e57f377c66f514490b" Jul 10 01:00:41.282207 env[1286]: 2025-07-10 01:00:41.270 [INFO][2804] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="34764dfbe2bcfa7c27deac9036fcf32920e6740c56f3a4e57f377c66f514490b" HandleID="k8s-pod-network.34764dfbe2bcfa7c27deac9036fcf32920e6740c56f3a4e57f377c66f514490b" Workload="10.67.124.135-k8s-csi--node--driver--bfm74-eth0" Jul 10 01:00:41.282207 env[1286]: 2025-07-10 01:00:41.270 [INFO][2804] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Jul 10 01:00:41.282207 env[1286]: 2025-07-10 01:00:41.270 [INFO][2804] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Jul 10 01:00:41.282207 env[1286]: 2025-07-10 01:00:41.276 [WARNING][2804] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="34764dfbe2bcfa7c27deac9036fcf32920e6740c56f3a4e57f377c66f514490b" HandleID="k8s-pod-network.34764dfbe2bcfa7c27deac9036fcf32920e6740c56f3a4e57f377c66f514490b" Workload="10.67.124.135-k8s-csi--node--driver--bfm74-eth0" Jul 10 01:00:41.282207 env[1286]: 2025-07-10 01:00:41.276 [INFO][2804] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="34764dfbe2bcfa7c27deac9036fcf32920e6740c56f3a4e57f377c66f514490b" HandleID="k8s-pod-network.34764dfbe2bcfa7c27deac9036fcf32920e6740c56f3a4e57f377c66f514490b" Workload="10.67.124.135-k8s-csi--node--driver--bfm74-eth0" Jul 10 01:00:41.282207 env[1286]: 2025-07-10 01:00:41.280 [INFO][2804] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Jul 10 01:00:41.282207 env[1286]: 2025-07-10 01:00:41.281 [INFO][2795] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="34764dfbe2bcfa7c27deac9036fcf32920e6740c56f3a4e57f377c66f514490b" Jul 10 01:00:41.282643 env[1286]: time="2025-07-10T01:00:41.282221703Z" level=info msg="TearDown network for sandbox \"34764dfbe2bcfa7c27deac9036fcf32920e6740c56f3a4e57f377c66f514490b\" successfully" Jul 10 01:00:41.282643 env[1286]: time="2025-07-10T01:00:41.282241406Z" level=info msg="StopPodSandbox for \"34764dfbe2bcfa7c27deac9036fcf32920e6740c56f3a4e57f377c66f514490b\" returns successfully" Jul 10 01:00:41.282838 env[1286]: time="2025-07-10T01:00:41.282820745Z" level=info msg="RemovePodSandbox for \"34764dfbe2bcfa7c27deac9036fcf32920e6740c56f3a4e57f377c66f514490b\"" Jul 10 01:00:41.282940 env[1286]: time="2025-07-10T01:00:41.282914370Z" level=info msg="Forcibly stopping sandbox \"34764dfbe2bcfa7c27deac9036fcf32920e6740c56f3a4e57f377c66f514490b\"" Jul 10 01:00:41.344917 env[1286]: 2025-07-10 01:00:41.320 [WARNING][2818] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="34764dfbe2bcfa7c27deac9036fcf32920e6740c56f3a4e57f377c66f514490b" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.67.124.135-k8s-csi--node--driver--bfm74-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"f8539811-5553-42c4-b972-5bfd95d2de66", ResourceVersion:"1363", Generation:0, CreationTimestamp:time.Date(2025, time.July, 10, 0, 59, 42, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"8967bcb6f", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.67.124.135", ContainerID:"81ce65593d66ae89d14ff4e2d7c22b2ae06740d7771ebc5b47ffc184c1a028b8", Pod:"csi-node-driver-bfm74", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.53.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"calic6b2b40d61a", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Jul 10 01:00:41.344917 env[1286]: 2025-07-10 01:00:41.320 [INFO][2818] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="34764dfbe2bcfa7c27deac9036fcf32920e6740c56f3a4e57f377c66f514490b" Jul 10 01:00:41.344917 env[1286]: 2025-07-10 01:00:41.320 [INFO][2818] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="34764dfbe2bcfa7c27deac9036fcf32920e6740c56f3a4e57f377c66f514490b" iface="eth0" netns="" Jul 10 01:00:41.344917 env[1286]: 2025-07-10 01:00:41.320 [INFO][2818] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="34764dfbe2bcfa7c27deac9036fcf32920e6740c56f3a4e57f377c66f514490b" Jul 10 01:00:41.344917 env[1286]: 2025-07-10 01:00:41.320 [INFO][2818] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="34764dfbe2bcfa7c27deac9036fcf32920e6740c56f3a4e57f377c66f514490b" Jul 10 01:00:41.344917 env[1286]: 2025-07-10 01:00:41.337 [INFO][2826] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="34764dfbe2bcfa7c27deac9036fcf32920e6740c56f3a4e57f377c66f514490b" HandleID="k8s-pod-network.34764dfbe2bcfa7c27deac9036fcf32920e6740c56f3a4e57f377c66f514490b" Workload="10.67.124.135-k8s-csi--node--driver--bfm74-eth0" Jul 10 01:00:41.344917 env[1286]: 2025-07-10 01:00:41.337 [INFO][2826] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Jul 10 01:00:41.344917 env[1286]: 2025-07-10 01:00:41.337 [INFO][2826] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Jul 10 01:00:41.344917 env[1286]: 2025-07-10 01:00:41.342 [WARNING][2826] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="34764dfbe2bcfa7c27deac9036fcf32920e6740c56f3a4e57f377c66f514490b" HandleID="k8s-pod-network.34764dfbe2bcfa7c27deac9036fcf32920e6740c56f3a4e57f377c66f514490b" Workload="10.67.124.135-k8s-csi--node--driver--bfm74-eth0" Jul 10 01:00:41.344917 env[1286]: 2025-07-10 01:00:41.342 [INFO][2826] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="34764dfbe2bcfa7c27deac9036fcf32920e6740c56f3a4e57f377c66f514490b" HandleID="k8s-pod-network.34764dfbe2bcfa7c27deac9036fcf32920e6740c56f3a4e57f377c66f514490b" Workload="10.67.124.135-k8s-csi--node--driver--bfm74-eth0" Jul 10 01:00:41.344917 env[1286]: 2025-07-10 01:00:41.343 [INFO][2826] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Jul 10 01:00:41.344917 env[1286]: 2025-07-10 01:00:41.343 [INFO][2818] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="34764dfbe2bcfa7c27deac9036fcf32920e6740c56f3a4e57f377c66f514490b" Jul 10 01:00:41.345552 env[1286]: time="2025-07-10T01:00:41.345526467Z" level=info msg="TearDown network for sandbox \"34764dfbe2bcfa7c27deac9036fcf32920e6740c56f3a4e57f377c66f514490b\" successfully" Jul 10 01:00:41.347361 env[1286]: time="2025-07-10T01:00:41.347337849Z" level=info msg="RemovePodSandbox \"34764dfbe2bcfa7c27deac9036fcf32920e6740c56f3a4e57f377c66f514490b\" returns successfully" Jul 10 01:00:42.105618 kubelet[1620]: E0710 01:00:42.105594 1620 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 01:00:43.106079 kubelet[1620]: E0710 01:00:43.106047 1620 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 01:00:44.107046 kubelet[1620]: E0710 01:00:44.107021 1620 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 01:00:45.107647 kubelet[1620]: E0710 01:00:45.107623 1620 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 01:00:46.108795 kubelet[1620]: E0710 01:00:46.108753 1620 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 01:00:47.109039 kubelet[1620]: E0710 01:00:47.109001 1620 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 01:00:48.109698 kubelet[1620]: E0710 01:00:48.109669 1620 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 01:00:49.110761 kubelet[1620]: E0710 01:00:49.110733 1620 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 01:00:50.111173 kubelet[1620]: E0710 01:00:50.111108 1620 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 01:00:51.111961 kubelet[1620]: E0710 01:00:51.111920 1620 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 01:00:52.112517 kubelet[1620]: E0710 01:00:52.112489 1620 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 01:00:53.113017 kubelet[1620]: E0710 01:00:53.112978 1620 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 01:00:54.113214 kubelet[1620]: E0710 01:00:54.113186 1620 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 01:00:55.114159 kubelet[1620]: E0710 01:00:55.114068 1620 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 01:00:56.115086 kubelet[1620]: E0710 01:00:56.115054 1620 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 01:00:57.115838 kubelet[1620]: E0710 01:00:57.115813 1620 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 01:00:58.117033 kubelet[1620]: E0710 01:00:58.117008 1620 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 01:00:59.117691 kubelet[1620]: E0710 01:00:59.117608 1620 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 01:01:00.117827 kubelet[1620]: E0710 01:01:00.117801 1620 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 01:01:00.216744 systemd[1]: run-containerd-runc-k8s.io-4627b58e82075f31fee1a01ca11701b9cec5ea1b58922d10114e451441294b1d-runc.9ihwa7.mount: Deactivated successfully. Jul 10 01:01:01.053036 kubelet[1620]: E0710 01:01:01.052973 1620 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 01:01:01.118680 kubelet[1620]: E0710 01:01:01.118656 1620 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 01:01:02.119863 kubelet[1620]: E0710 01:01:02.119837 1620 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 01:01:03.120480 kubelet[1620]: E0710 01:01:03.120452 1620 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 01:01:04.121146 kubelet[1620]: E0710 01:01:04.121108 1620 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 01:01:05.121635 kubelet[1620]: E0710 01:01:05.121613 1620 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 01:01:06.123029 kubelet[1620]: E0710 01:01:06.122999 1620 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 01:01:07.123126 kubelet[1620]: E0710 01:01:07.123089 1620 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 01:01:08.123829 kubelet[1620]: E0710 01:01:08.123798 1620 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 01:01:09.123967 kubelet[1620]: E0710 01:01:09.123922 1620 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 01:01:10.124639 kubelet[1620]: E0710 01:01:10.124589 1620 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 01:01:11.125128 kubelet[1620]: E0710 01:01:11.125060 1620 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 01:01:12.126181 kubelet[1620]: E0710 01:01:12.126152 1620 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 01:01:13.127362 kubelet[1620]: E0710 01:01:13.127328 1620 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 01:01:14.128233 kubelet[1620]: E0710 01:01:14.128193 1620 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 01:01:15.128813 kubelet[1620]: E0710 01:01:15.128748 1620 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 01:01:16.129818 kubelet[1620]: E0710 01:01:16.129791 1620 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 01:01:17.130848 kubelet[1620]: E0710 01:01:17.130817 1620 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 01:01:18.131158 kubelet[1620]: E0710 01:01:18.131120 1620 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 01:01:19.131485 kubelet[1620]: E0710 01:01:19.131447 1620 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 01:01:20.132007 kubelet[1620]: E0710 01:01:20.131971 1620 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 01:01:21.052387 kubelet[1620]: E0710 01:01:21.052353 1620 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 01:01:21.133001 kubelet[1620]: E0710 01:01:21.132973 1620 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 01:01:22.133688 kubelet[1620]: E0710 01:01:22.133658 1620 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 01:01:23.134111 kubelet[1620]: E0710 01:01:23.134072 1620 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 01:01:24.134926 kubelet[1620]: E0710 01:01:24.134899 1620 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 01:01:25.135303 kubelet[1620]: E0710 01:01:25.135248 1620 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 01:01:26.135871 kubelet[1620]: E0710 01:01:26.135829 1620 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 01:01:26.771000 audit[2877]: NETFILTER_CFG table=filter:71 family=2 entries=22 op=nft_register_rule pid=2877 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 10 01:01:26.775509 kernel: kauditd_printk_skb: 49 callbacks suppressed Jul 10 01:01:26.775611 kernel: audit: type=1325 audit(1752109286.771:715): table=filter:71 family=2 entries=22 op=nft_register_rule pid=2877 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 10 01:01:26.771000 audit[2877]: SYSCALL arch=c000003e syscall=46 success=yes exit=12688 a0=3 a1=7ffe76956250 a2=0 a3=7ffe7695623c items=0 ppid=1851 pid=2877 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 01:01:26.782124 kernel: audit: type=1300 audit(1752109286.771:715): arch=c000003e syscall=46 success=yes exit=12688 a0=3 a1=7ffe76956250 a2=0 a3=7ffe7695623c items=0 ppid=1851 pid=2877 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 01:01:26.782234 kernel: audit: type=1327 audit(1752109286.771:715): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 10 01:01:26.771000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 10 01:01:26.785000 audit[2877]: NETFILTER_CFG table=nat:72 family=2 entries=24 op=nft_register_rule pid=2877 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 10 01:01:26.785000 audit[2877]: SYSCALL arch=c000003e syscall=46 success=yes exit=7308 a0=3 a1=7ffe76956250 a2=0 a3=0 items=0 ppid=1851 pid=2877 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 01:01:26.793191 kernel: audit: type=1325 audit(1752109286.785:716): table=nat:72 family=2 entries=24 op=nft_register_rule pid=2877 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 10 01:01:26.793288 kernel: audit: type=1300 audit(1752109286.785:716): arch=c000003e syscall=46 success=yes exit=7308 a0=3 a1=7ffe76956250 a2=0 a3=0 items=0 ppid=1851 pid=2877 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 01:01:26.793307 kernel: audit: type=1327 audit(1752109286.785:716): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 10 01:01:26.785000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 10 01:01:27.135988 kubelet[1620]: E0710 01:01:27.135964 1620 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 01:01:28.137097 kubelet[1620]: E0710 01:01:28.137064 1620 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 01:01:29.137744 kubelet[1620]: E0710 01:01:29.137718 1620 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 01:01:30.138394 kubelet[1620]: E0710 01:01:30.138364 1620 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 01:01:30.217308 systemd[1]: run-containerd-runc-k8s.io-4627b58e82075f31fee1a01ca11701b9cec5ea1b58922d10114e451441294b1d-runc.ib1SGm.mount: Deactivated successfully. Jul 10 01:01:31.139160 kubelet[1620]: E0710 01:01:31.139090 1620 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 01:01:32.139508 kubelet[1620]: E0710 01:01:32.139459 1620 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 01:01:33.140541 kubelet[1620]: E0710 01:01:33.140509 1620 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 01:01:34.141859 kubelet[1620]: E0710 01:01:34.141831 1620 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 01:01:35.143197 kubelet[1620]: E0710 01:01:35.143167 1620 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 01:01:36.143885 kubelet[1620]: E0710 01:01:36.143861 1620 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 01:01:37.144243 kubelet[1620]: E0710 01:01:37.144205 1620 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 01:01:38.145253 kubelet[1620]: E0710 01:01:38.145220 1620 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 01:01:39.145814 kubelet[1620]: E0710 01:01:39.145790 1620 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 01:01:40.146977 kubelet[1620]: E0710 01:01:40.146945 1620 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 01:01:40.985262 systemd[1]: Started sshd@8-139.178.70.103:22-80.94.95.116:19002.service. Jul 10 01:01:40.985000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-139.178.70.103:22-80.94.95.116:19002 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 01:01:40.992444 kernel: audit: type=1130 audit(1752109300.985:717): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-139.178.70.103:22-80.94.95.116:19002 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 01:01:41.052560 kubelet[1620]: E0710 01:01:41.052532 1620 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 01:01:41.148055 kubelet[1620]: E0710 01:01:41.148028 1620 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 01:01:42.148446 kubelet[1620]: E0710 01:01:42.148401 1620 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 01:01:43.149301 kubelet[1620]: E0710 01:01:43.149262 1620 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 01:01:44.150615 kubelet[1620]: E0710 01:01:44.150576 1620 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 01:01:45.151324 kubelet[1620]: E0710 01:01:45.151300 1620 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 01:01:46.152055 kubelet[1620]: E0710 01:01:46.152019 1620 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 01:01:47.152222 kubelet[1620]: E0710 01:01:47.152161 1620 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 01:01:47.281513 sshd[2916]: Invalid user carlos from 80.94.95.116 port 19002 Jul 10 01:01:47.640637 sshd[2916]: pam_faillock(sshd:auth): User unknown Jul 10 01:01:47.641486 sshd[2916]: pam_unix(sshd:auth): check pass; user unknown Jul 10 01:01:47.641521 sshd[2916]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.94.95.116 Jul 10 01:01:47.640000 audit[2916]: USER_AUTH pid=2916 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="carlos" exe="/usr/sbin/sshd" hostname=80.94.95.116 addr=80.94.95.116 terminal=ssh res=failed' Jul 10 01:01:47.641762 sshd[2916]: pam_faillock(sshd:auth): User unknown Jul 10 01:01:47.645431 kernel: audit: type=1100 audit(1752109307.640:718): pid=2916 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="carlos" exe="/usr/sbin/sshd" hostname=80.94.95.116 addr=80.94.95.116 terminal=ssh res=failed' Jul 10 01:01:48.153248 kubelet[1620]: E0710 01:01:48.153206 1620 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 01:01:49.154076 kubelet[1620]: E0710 01:01:49.154048 1620 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 01:01:49.246177 sshd[2916]: Failed password for invalid user carlos from 80.94.95.116 port 19002 ssh2 Jul 10 01:01:50.155041 kubelet[1620]: E0710 01:01:50.155014 1620 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 01:01:50.267632 sshd[2916]: Connection closed by invalid user carlos 80.94.95.116 port 19002 [preauth] Jul 10 01:01:50.267000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-139.178.70.103:22-80.94.95.116:19002 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 01:01:50.268684 systemd[1]: sshd@8-139.178.70.103:22-80.94.95.116:19002.service: Deactivated successfully. Jul 10 01:01:50.273429 kernel: audit: type=1131 audit(1752109310.267:719): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-139.178.70.103:22-80.94.95.116:19002 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 01:01:50.652000 audit[2924]: NETFILTER_CFG table=filter:73 family=2 entries=34 op=nft_register_rule pid=2924 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 10 01:01:50.652000 audit[2924]: SYSCALL arch=c000003e syscall=46 success=yes exit=12688 a0=3 a1=7ffc7aa8cec0 a2=0 a3=7ffc7aa8ceac items=0 ppid=1851 pid=2924 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 01:01:50.662436 kernel: audit: type=1325 audit(1752109310.652:720): table=filter:73 family=2 entries=34 op=nft_register_rule pid=2924 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 10 01:01:50.662492 kernel: audit: type=1300 audit(1752109310.652:720): arch=c000003e syscall=46 success=yes exit=12688 a0=3 a1=7ffc7aa8cec0 a2=0 a3=7ffc7aa8ceac items=0 ppid=1851 pid=2924 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 01:01:50.652000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 10 01:01:50.664817 kernel: audit: type=1327 audit(1752109310.652:720): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 10 01:01:50.666000 audit[2924]: NETFILTER_CFG table=nat:74 family=2 entries=24 op=nft_register_rule pid=2924 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 10 01:01:50.666000 audit[2924]: SYSCALL arch=c000003e syscall=46 success=yes exit=7308 a0=3 a1=7ffc7aa8cec0 a2=0 a3=0 items=0 ppid=1851 pid=2924 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 01:01:50.674449 kernel: audit: type=1325 audit(1752109310.666:721): table=nat:74 family=2 entries=24 op=nft_register_rule pid=2924 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 10 01:01:50.674497 kernel: audit: type=1300 audit(1752109310.666:721): arch=c000003e syscall=46 success=yes exit=7308 a0=3 a1=7ffc7aa8cec0 a2=0 a3=0 items=0 ppid=1851 pid=2924 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 01:01:50.666000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 10 01:01:50.676499 kernel: audit: type=1327 audit(1752109310.666:721): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 10 01:01:50.703000 audit[2926]: NETFILTER_CFG table=filter:75 family=2 entries=33 op=nft_register_rule pid=2926 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 10 01:01:50.703000 audit[2926]: SYSCALL arch=c000003e syscall=46 success=yes exit=11944 a0=3 a1=7ffff8b5a6a0 a2=0 a3=7ffff8b5a68c items=0 ppid=1851 pid=2926 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 01:01:50.710593 kernel: audit: type=1325 audit(1752109310.703:722): table=filter:75 family=2 entries=33 op=nft_register_rule pid=2926 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 10 01:01:50.710629 kernel: audit: type=1300 audit(1752109310.703:722): arch=c000003e syscall=46 success=yes exit=11944 a0=3 a1=7ffff8b5a6a0 a2=0 a3=7ffff8b5a68c items=0 ppid=1851 pid=2926 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 01:01:50.703000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 10 01:01:50.713000 audit[2926]: NETFILTER_CFG table=nat:76 family=2 entries=47 op=nft_register_chain pid=2926 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 10 01:01:50.713000 audit[2926]: SYSCALL arch=c000003e syscall=46 success=yes exit=17468 a0=3 a1=7ffff8b5a6a0 a2=0 a3=7ffff8b5a68c items=0 ppid=1851 pid=2926 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 01:01:50.713000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 10 01:01:51.156049 kubelet[1620]: E0710 01:01:51.156023 1620 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 01:01:51.722000 audit[2928]: NETFILTER_CFG table=filter:77 family=2 entries=32 op=nft_register_rule pid=2928 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 10 01:01:51.722000 audit[2928]: SYSCALL arch=c000003e syscall=46 success=yes exit=11944 a0=3 a1=7ffec5e96470 a2=0 a3=7ffec5e9645c items=0 ppid=1851 pid=2928 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 01:01:51.722000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 10 01:01:51.726000 audit[2928]: NETFILTER_CFG table=nat:78 family=2 entries=44 op=nft_unregister_chain pid=2928 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 10 01:01:51.726000 audit[2928]: SYSCALL arch=c000003e syscall=46 success=yes exit=12900 a0=3 a1=7ffec5e96470 a2=0 a3=7ffec5e9645c items=0 ppid=1851 pid=2928 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 01:01:51.726000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 10 01:01:52.156804 kubelet[1620]: E0710 01:01:52.156740 1620 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 01:01:53.158117 kubelet[1620]: E0710 01:01:53.158086 1620 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 01:01:54.159051 kubelet[1620]: E0710 01:01:54.159025 1620 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 01:01:54.481670 systemd[1]: Created slice kubepods-besteffort-poda77b67dc_81c0_45cd_81a6_6295e85a7df0.slice. Jul 10 01:01:54.609067 kubelet[1620]: I0710 01:01:54.609038 1620 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"data\" (UniqueName: \"kubernetes.io/empty-dir/a77b67dc-81c0-45cd-81a6-6295e85a7df0-data\") pod \"nfs-server-provisioner-0\" (UID: \"a77b67dc-81c0-45cd-81a6-6295e85a7df0\") " pod="default/nfs-server-provisioner-0" Jul 10 01:01:54.609067 kubelet[1620]: I0710 01:01:54.609069 1620 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-4qhkl\" (UniqueName: \"kubernetes.io/projected/a77b67dc-81c0-45cd-81a6-6295e85a7df0-kube-api-access-4qhkl\") pod \"nfs-server-provisioner-0\" (UID: \"a77b67dc-81c0-45cd-81a6-6295e85a7df0\") " pod="default/nfs-server-provisioner-0" Jul 10 01:01:54.784174 env[1286]: time="2025-07-10T01:01:54.783640389Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:a77b67dc-81c0-45cd-81a6-6295e85a7df0,Namespace:default,Attempt:0,}" Jul 10 01:01:55.159861 kubelet[1620]: E0710 01:01:55.159806 1620 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 01:01:55.543511 systemd-networkd[1081]: cali60e51b789ff: Link UP Jul 10 01:01:55.547647 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Jul 10 01:01:55.547705 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali60e51b789ff: link becomes ready Jul 10 01:01:55.547392 systemd-networkd[1081]: cali60e51b789ff: Gained carrier Jul 10 01:01:55.609446 env[1286]: 2025-07-10 01:01:55.096 [INFO][2930] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.67.124.135-k8s-nfs--server--provisioner--0-eth0 nfs-server-provisioner- default a77b67dc-81c0-45cd-81a6-6295e85a7df0 1606 0 2025-07-10 01:01:51 +0000 UTC map[app:nfs-server-provisioner apps.kubernetes.io/pod-index:0 chart:nfs-server-provisioner-1.8.0 controller-revision-hash:nfs-server-provisioner-d5cbb7f57 heritage:Helm projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:nfs-server-provisioner release:nfs-server-provisioner statefulset.kubernetes.io/pod-name:nfs-server-provisioner-0] map[] [] [] []} {k8s 10.67.124.135 nfs-server-provisioner-0 eth0 nfs-server-provisioner [] [] [kns.default ksa.default.nfs-server-provisioner] cali60e51b789ff [{nfs TCP 2049 0 } {nfs-udp UDP 2049 0 } {nlockmgr TCP 32803 0 } {nlockmgr-udp UDP 32803 0 } {mountd TCP 20048 0 } {mountd-udp UDP 20048 0 } {rquotad TCP 875 0 } {rquotad-udp UDP 875 0 } {rpcbind TCP 111 0 } {rpcbind-udp UDP 111 0 } {statd TCP 662 0 } {statd-udp UDP 662 0 }] [] }} ContainerID="b8f8ac1944f1050efb60dcfe27461e2d028f20a54caccfe049d7f153cc3aacc0" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.67.124.135-k8s-nfs--server--provisioner--0-" Jul 10 01:01:55.609446 env[1286]: 2025-07-10 01:01:55.096 [INFO][2930] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="b8f8ac1944f1050efb60dcfe27461e2d028f20a54caccfe049d7f153cc3aacc0" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.67.124.135-k8s-nfs--server--provisioner--0-eth0" Jul 10 01:01:55.609446 env[1286]: 2025-07-10 01:01:55.119 [INFO][2944] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="b8f8ac1944f1050efb60dcfe27461e2d028f20a54caccfe049d7f153cc3aacc0" HandleID="k8s-pod-network.b8f8ac1944f1050efb60dcfe27461e2d028f20a54caccfe049d7f153cc3aacc0" Workload="10.67.124.135-k8s-nfs--server--provisioner--0-eth0" Jul 10 01:01:55.609446 env[1286]: 2025-07-10 01:01:55.119 [INFO][2944] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="b8f8ac1944f1050efb60dcfe27461e2d028f20a54caccfe049d7f153cc3aacc0" HandleID="k8s-pod-network.b8f8ac1944f1050efb60dcfe27461e2d028f20a54caccfe049d7f153cc3aacc0" Workload="10.67.124.135-k8s-nfs--server--provisioner--0-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002c4ff0), Attrs:map[string]string{"namespace":"default", "node":"10.67.124.135", "pod":"nfs-server-provisioner-0", "timestamp":"2025-07-10 01:01:55.119822212 +0000 UTC"}, Hostname:"10.67.124.135", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Jul 10 01:01:55.609446 env[1286]: 2025-07-10 01:01:55.119 [INFO][2944] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Jul 10 01:01:55.609446 env[1286]: 2025-07-10 01:01:55.120 [INFO][2944] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Jul 10 01:01:55.609446 env[1286]: 2025-07-10 01:01:55.120 [INFO][2944] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.67.124.135' Jul 10 01:01:55.609446 env[1286]: 2025-07-10 01:01:55.175 [INFO][2944] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.b8f8ac1944f1050efb60dcfe27461e2d028f20a54caccfe049d7f153cc3aacc0" host="10.67.124.135" Jul 10 01:01:55.609446 env[1286]: 2025-07-10 01:01:55.216 [INFO][2944] ipam/ipam.go 394: Looking up existing affinities for host host="10.67.124.135" Jul 10 01:01:55.609446 env[1286]: 2025-07-10 01:01:55.261 [INFO][2944] ipam/ipam.go 511: Trying affinity for 192.168.53.128/26 host="10.67.124.135" Jul 10 01:01:55.609446 env[1286]: 2025-07-10 01:01:55.262 [INFO][2944] ipam/ipam.go 158: Attempting to load block cidr=192.168.53.128/26 host="10.67.124.135" Jul 10 01:01:55.609446 env[1286]: 2025-07-10 01:01:55.265 [INFO][2944] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.53.128/26 host="10.67.124.135" Jul 10 01:01:55.609446 env[1286]: 2025-07-10 01:01:55.265 [INFO][2944] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.53.128/26 handle="k8s-pod-network.b8f8ac1944f1050efb60dcfe27461e2d028f20a54caccfe049d7f153cc3aacc0" host="10.67.124.135" Jul 10 01:01:55.609446 env[1286]: 2025-07-10 01:01:55.274 [INFO][2944] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.b8f8ac1944f1050efb60dcfe27461e2d028f20a54caccfe049d7f153cc3aacc0 Jul 10 01:01:55.609446 env[1286]: 2025-07-10 01:01:55.426 [INFO][2944] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.53.128/26 handle="k8s-pod-network.b8f8ac1944f1050efb60dcfe27461e2d028f20a54caccfe049d7f153cc3aacc0" host="10.67.124.135" Jul 10 01:01:55.609446 env[1286]: 2025-07-10 01:01:55.531 [INFO][2944] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.53.131/26] block=192.168.53.128/26 handle="k8s-pod-network.b8f8ac1944f1050efb60dcfe27461e2d028f20a54caccfe049d7f153cc3aacc0" host="10.67.124.135" Jul 10 01:01:55.609446 env[1286]: 2025-07-10 01:01:55.531 [INFO][2944] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.53.131/26] handle="k8s-pod-network.b8f8ac1944f1050efb60dcfe27461e2d028f20a54caccfe049d7f153cc3aacc0" host="10.67.124.135" Jul 10 01:01:55.609446 env[1286]: 2025-07-10 01:01:55.531 [INFO][2944] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Jul 10 01:01:55.609446 env[1286]: 2025-07-10 01:01:55.531 [INFO][2944] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.53.131/26] IPv6=[] ContainerID="b8f8ac1944f1050efb60dcfe27461e2d028f20a54caccfe049d7f153cc3aacc0" HandleID="k8s-pod-network.b8f8ac1944f1050efb60dcfe27461e2d028f20a54caccfe049d7f153cc3aacc0" Workload="10.67.124.135-k8s-nfs--server--provisioner--0-eth0" Jul 10 01:01:55.609984 env[1286]: 2025-07-10 01:01:55.533 [INFO][2930] cni-plugin/k8s.go 418: Populated endpoint ContainerID="b8f8ac1944f1050efb60dcfe27461e2d028f20a54caccfe049d7f153cc3aacc0" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.67.124.135-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.67.124.135-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"a77b67dc-81c0-45cd-81a6-6295e85a7df0", ResourceVersion:"1606", Generation:0, CreationTimestamp:time.Date(2025, time.July, 10, 1, 1, 51, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "apps.kubernetes.io/pod-index":"0", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.67.124.135", ContainerID:"", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.53.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Jul 10 01:01:55.609984 env[1286]: 2025-07-10 01:01:55.533 [INFO][2930] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.53.131/32] ContainerID="b8f8ac1944f1050efb60dcfe27461e2d028f20a54caccfe049d7f153cc3aacc0" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.67.124.135-k8s-nfs--server--provisioner--0-eth0" Jul 10 01:01:55.609984 env[1286]: 2025-07-10 01:01:55.533 [INFO][2930] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali60e51b789ff ContainerID="b8f8ac1944f1050efb60dcfe27461e2d028f20a54caccfe049d7f153cc3aacc0" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.67.124.135-k8s-nfs--server--provisioner--0-eth0" Jul 10 01:01:55.609984 env[1286]: 2025-07-10 01:01:55.548 [INFO][2930] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="b8f8ac1944f1050efb60dcfe27461e2d028f20a54caccfe049d7f153cc3aacc0" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.67.124.135-k8s-nfs--server--provisioner--0-eth0" Jul 10 01:01:55.610133 env[1286]: 2025-07-10 01:01:55.548 [INFO][2930] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="b8f8ac1944f1050efb60dcfe27461e2d028f20a54caccfe049d7f153cc3aacc0" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.67.124.135-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.67.124.135-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"a77b67dc-81c0-45cd-81a6-6295e85a7df0", ResourceVersion:"1606", Generation:0, CreationTimestamp:time.Date(2025, time.July, 10, 1, 1, 51, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "apps.kubernetes.io/pod-index":"0", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.67.124.135", ContainerID:"b8f8ac1944f1050efb60dcfe27461e2d028f20a54caccfe049d7f153cc3aacc0", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.53.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"ea:0e:08:d1:ee:13", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Jul 10 01:01:55.610133 env[1286]: 2025-07-10 01:01:55.608 [INFO][2930] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="b8f8ac1944f1050efb60dcfe27461e2d028f20a54caccfe049d7f153cc3aacc0" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.67.124.135-k8s-nfs--server--provisioner--0-eth0" Jul 10 01:01:55.616840 env[1286]: time="2025-07-10T01:01:55.616785008Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 10 01:01:55.616983 env[1286]: time="2025-07-10T01:01:55.616819779Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 10 01:01:55.616983 env[1286]: time="2025-07-10T01:01:55.616837227Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 10 01:01:55.619373 env[1286]: time="2025-07-10T01:01:55.616993909Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/b8f8ac1944f1050efb60dcfe27461e2d028f20a54caccfe049d7f153cc3aacc0 pid=2963 runtime=io.containerd.runc.v2 Jul 10 01:01:55.627474 systemd[1]: Started cri-containerd-b8f8ac1944f1050efb60dcfe27461e2d028f20a54caccfe049d7f153cc3aacc0.scope. Jul 10 01:01:55.648334 kernel: kauditd_printk_skb: 10 callbacks suppressed Jul 10 01:01:55.648481 kernel: audit: type=1400 audit(1752109315.639:726): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:01:55.648509 kernel: audit: type=1400 audit(1752109315.639:727): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:01:55.648524 kernel: audit: type=1400 audit(1752109315.639:728): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:01:55.639000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:01:55.639000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:01:55.639000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:01:55.651834 kernel: audit: type=1400 audit(1752109315.639:729): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:01:55.639000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:01:55.651813 systemd-resolved[1222]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Jul 10 01:01:55.639000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:01:55.656978 kernel: audit: type=1400 audit(1752109315.639:730): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:01:55.657029 kernel: audit: type=1400 audit(1752109315.639:731): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:01:55.639000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:01:55.659506 kernel: audit: type=1400 audit(1752109315.639:732): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:01:55.639000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:01:55.662004 kernel: audit: type=1400 audit(1752109315.639:733): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:01:55.639000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:01:55.664449 kernel: audit: type=1400 audit(1752109315.639:734): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:01:55.639000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:01:55.666868 kernel: audit: type=1400 audit(1752109315.645:735): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:01:55.645000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:01:55.645000 audit: BPF prog-id=118 op=LOAD Jul 10 01:01:55.645000 audit[2973]: AVC avc: denied { bpf } for pid=2973 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:01:55.645000 audit[2973]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2963 pid=2973 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 01:01:55.645000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6238663861633139343466313035306566623630646366653237343631 Jul 10 01:01:55.645000 audit[2973]: AVC avc: denied { perfmon } for pid=2973 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:01:55.645000 audit[2973]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=2963 pid=2973 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 01:01:55.645000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6238663861633139343466313035306566623630646366653237343631 Jul 10 01:01:55.645000 audit[2973]: AVC avc: denied { bpf } for pid=2973 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:01:55.645000 audit[2973]: AVC avc: denied { bpf } for pid=2973 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:01:55.645000 audit[2973]: AVC avc: denied { bpf } for pid=2973 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:01:55.645000 audit[2973]: AVC avc: denied { perfmon } for pid=2973 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:01:55.645000 audit[2973]: AVC avc: denied { perfmon } for pid=2973 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:01:55.645000 audit[2973]: AVC avc: denied { perfmon } for pid=2973 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:01:55.645000 audit[2973]: AVC avc: denied { perfmon } for pid=2973 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:01:55.645000 audit[2973]: AVC avc: denied { perfmon } for pid=2973 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:01:55.645000 audit[2973]: AVC avc: denied { bpf } for pid=2973 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:01:55.645000 audit[2973]: AVC avc: denied { bpf } for pid=2973 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:01:55.645000 audit: BPF prog-id=119 op=LOAD Jul 10 01:01:55.645000 audit[2973]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0002edd90 items=0 ppid=2963 pid=2973 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 01:01:55.645000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6238663861633139343466313035306566623630646366653237343631 Jul 10 01:01:55.647000 audit[2973]: AVC avc: denied { bpf } for pid=2973 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:01:55.647000 audit[2973]: AVC avc: denied { bpf } for pid=2973 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:01:55.647000 audit[2973]: AVC avc: denied { perfmon } for pid=2973 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:01:55.647000 audit[2973]: AVC avc: denied { perfmon } for pid=2973 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:01:55.647000 audit[2973]: AVC avc: denied { perfmon } for pid=2973 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:01:55.647000 audit[2973]: AVC avc: denied { perfmon } for pid=2973 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:01:55.647000 audit[2973]: AVC avc: denied { perfmon } for pid=2973 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:01:55.647000 audit[2973]: AVC avc: denied { bpf } for pid=2973 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:01:55.647000 audit[2973]: AVC avc: denied { bpf } for pid=2973 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:01:55.647000 audit: BPF prog-id=120 op=LOAD Jul 10 01:01:55.647000 audit[2973]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0002eddd8 items=0 ppid=2963 pid=2973 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 01:01:55.647000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6238663861633139343466313035306566623630646366653237343631 Jul 10 01:01:55.647000 audit: BPF prog-id=120 op=UNLOAD Jul 10 01:01:55.647000 audit: BPF prog-id=119 op=UNLOAD Jul 10 01:01:55.647000 audit[2973]: AVC avc: denied { bpf } for pid=2973 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:01:55.647000 audit[2973]: AVC avc: denied { bpf } for pid=2973 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:01:55.647000 audit[2973]: AVC avc: denied { bpf } for pid=2973 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:01:55.647000 audit[2973]: AVC avc: denied { perfmon } for pid=2973 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:01:55.647000 audit[2973]: AVC avc: denied { perfmon } for pid=2973 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:01:55.647000 audit[2973]: AVC avc: denied { perfmon } for pid=2973 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:01:55.647000 audit[2973]: AVC avc: denied { perfmon } for pid=2973 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:01:55.647000 audit[2973]: AVC avc: denied { perfmon } for pid=2973 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:01:55.647000 audit[2973]: AVC avc: denied { bpf } for pid=2973 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:01:55.647000 audit[2973]: AVC avc: denied { bpf } for pid=2973 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:01:55.647000 audit: BPF prog-id=121 op=LOAD Jul 10 01:01:55.647000 audit[2973]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003e61e8 items=0 ppid=2963 pid=2973 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 01:01:55.647000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6238663861633139343466313035306566623630646366653237343631 Jul 10 01:01:55.678934 env[1286]: time="2025-07-10T01:01:55.678902669Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:a77b67dc-81c0-45cd-81a6-6295e85a7df0,Namespace:default,Attempt:0,} returns sandbox id \"b8f8ac1944f1050efb60dcfe27461e2d028f20a54caccfe049d7f153cc3aacc0\"" Jul 10 01:01:55.679947 env[1286]: time="2025-07-10T01:01:55.679932935Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\"" Jul 10 01:01:55.803000 audit[2999]: NETFILTER_CFG table=filter:79 family=2 entries=40 op=nft_register_chain pid=2999 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 10 01:01:55.803000 audit[2999]: SYSCALL arch=c000003e syscall=46 success=yes exit=20756 a0=3 a1=7ffcf096b0e0 a2=0 a3=7ffcf096b0cc items=0 ppid=2255 pid=2999 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 01:01:55.803000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 10 01:01:56.160537 kubelet[1620]: E0710 01:01:56.160498 1620 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 01:01:56.888557 systemd-networkd[1081]: cali60e51b789ff: Gained IPv6LL Jul 10 01:01:57.161629 kubelet[1620]: E0710 01:01:57.161402 1620 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 01:01:58.036094 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3849251226.mount: Deactivated successfully. Jul 10 01:01:58.162479 kubelet[1620]: E0710 01:01:58.162445 1620 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 01:01:59.163056 kubelet[1620]: E0710 01:01:59.163023 1620 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 01:01:59.593568 env[1286]: time="2025-07-10T01:01:59.593531001Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 10 01:01:59.595149 env[1286]: time="2025-07-10T01:01:59.595131995Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:fd0b16f70b66b72bcb2f91d556fa33eba02729c44ffc5f2c16130e7f9fbed3c4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 10 01:01:59.596519 env[1286]: time="2025-07-10T01:01:59.596501718Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 10 01:01:59.597825 env[1286]: time="2025-07-10T01:01:59.597807507Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 10 01:01:59.598252 env[1286]: time="2025-07-10T01:01:59.598231538Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\" returns image reference \"sha256:fd0b16f70b66b72bcb2f91d556fa33eba02729c44ffc5f2c16130e7f9fbed3c4\"" Jul 10 01:01:59.603325 env[1286]: time="2025-07-10T01:01:59.603297879Z" level=info msg="CreateContainer within sandbox \"b8f8ac1944f1050efb60dcfe27461e2d028f20a54caccfe049d7f153cc3aacc0\" for container &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,}" Jul 10 01:01:59.610533 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2553057012.mount: Deactivated successfully. Jul 10 01:01:59.615602 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1368881574.mount: Deactivated successfully. Jul 10 01:01:59.620386 env[1286]: time="2025-07-10T01:01:59.620353241Z" level=info msg="CreateContainer within sandbox \"b8f8ac1944f1050efb60dcfe27461e2d028f20a54caccfe049d7f153cc3aacc0\" for &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,} returns container id \"c6397737257dadcab708d5c99c6705eded5a1cac87fd4988b97085b544cd4713\"" Jul 10 01:01:59.621071 env[1286]: time="2025-07-10T01:01:59.621039327Z" level=info msg="StartContainer for \"c6397737257dadcab708d5c99c6705eded5a1cac87fd4988b97085b544cd4713\"" Jul 10 01:01:59.636949 systemd[1]: Started cri-containerd-c6397737257dadcab708d5c99c6705eded5a1cac87fd4988b97085b544cd4713.scope. Jul 10 01:01:59.662000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:01:59.662000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:01:59.662000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:01:59.662000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:01:59.662000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:01:59.662000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:01:59.662000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:01:59.662000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:01:59.662000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:01:59.662000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:01:59.662000 audit: BPF prog-id=122 op=LOAD Jul 10 01:01:59.662000 audit[3008]: AVC avc: denied { bpf } for pid=3008 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:01:59.662000 audit[3008]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2963 pid=3008 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 01:01:59.662000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6336333937373337323537646164636162373038643563393963363730 Jul 10 01:01:59.662000 audit[3008]: AVC avc: denied { perfmon } for pid=3008 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:01:59.662000 audit[3008]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=2963 pid=3008 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 01:01:59.662000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6336333937373337323537646164636162373038643563393963363730 Jul 10 01:01:59.662000 audit[3008]: AVC avc: denied { bpf } for pid=3008 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:01:59.662000 audit[3008]: AVC avc: denied { bpf } for pid=3008 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:01:59.662000 audit[3008]: AVC avc: denied { bpf } for pid=3008 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:01:59.662000 audit[3008]: AVC avc: denied { perfmon } for pid=3008 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:01:59.662000 audit[3008]: AVC avc: denied { perfmon } for pid=3008 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:01:59.662000 audit[3008]: AVC avc: denied { perfmon } for pid=3008 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:01:59.662000 audit[3008]: AVC avc: denied { perfmon } for pid=3008 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:01:59.662000 audit[3008]: AVC avc: denied { perfmon } for pid=3008 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:01:59.662000 audit[3008]: AVC avc: denied { bpf } for pid=3008 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:01:59.662000 audit[3008]: AVC avc: denied { bpf } for pid=3008 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:01:59.662000 audit: BPF prog-id=123 op=LOAD Jul 10 01:01:59.662000 audit[3008]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0002a8cb0 items=0 ppid=2963 pid=3008 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 01:01:59.662000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6336333937373337323537646164636162373038643563393963363730 Jul 10 01:01:59.662000 audit[3008]: AVC avc: denied { bpf } for pid=3008 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:01:59.662000 audit[3008]: AVC avc: denied { bpf } for pid=3008 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:01:59.662000 audit[3008]: AVC avc: denied { perfmon } for pid=3008 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:01:59.662000 audit[3008]: AVC avc: denied { perfmon } for pid=3008 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:01:59.662000 audit[3008]: AVC avc: denied { perfmon } for pid=3008 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:01:59.662000 audit[3008]: AVC avc: denied { perfmon } for pid=3008 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:01:59.662000 audit[3008]: AVC avc: denied { perfmon } for pid=3008 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:01:59.662000 audit[3008]: AVC avc: denied { bpf } for pid=3008 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:01:59.662000 audit[3008]: AVC avc: denied { bpf } for pid=3008 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:01:59.662000 audit: BPF prog-id=124 op=LOAD Jul 10 01:01:59.662000 audit[3008]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0002a8cf8 items=0 ppid=2963 pid=3008 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 01:01:59.662000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6336333937373337323537646164636162373038643563393963363730 Jul 10 01:01:59.662000 audit: BPF prog-id=124 op=UNLOAD Jul 10 01:01:59.662000 audit: BPF prog-id=123 op=UNLOAD Jul 10 01:01:59.662000 audit[3008]: AVC avc: denied { bpf } for pid=3008 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:01:59.662000 audit[3008]: AVC avc: denied { bpf } for pid=3008 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:01:59.662000 audit[3008]: AVC avc: denied { bpf } for pid=3008 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:01:59.662000 audit[3008]: AVC avc: denied { perfmon } for pid=3008 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:01:59.662000 audit[3008]: AVC avc: denied { perfmon } for pid=3008 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:01:59.662000 audit[3008]: AVC avc: denied { perfmon } for pid=3008 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:01:59.662000 audit[3008]: AVC avc: denied { perfmon } for pid=3008 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:01:59.662000 audit[3008]: AVC avc: denied { perfmon } for pid=3008 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:01:59.662000 audit[3008]: AVC avc: denied { bpf } for pid=3008 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:01:59.662000 audit[3008]: AVC avc: denied { bpf } for pid=3008 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:01:59.662000 audit: BPF prog-id=125 op=LOAD Jul 10 01:01:59.662000 audit[3008]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0002a9108 items=0 ppid=2963 pid=3008 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 01:01:59.662000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6336333937373337323537646164636162373038643563393963363730 Jul 10 01:01:59.687438 env[1286]: time="2025-07-10T01:01:59.679853950Z" level=info msg="StartContainer for \"c6397737257dadcab708d5c99c6705eded5a1cac87fd4988b97085b544cd4713\" returns successfully" Jul 10 01:01:59.705000 audit[3037]: AVC avc: denied { search } for pid=3037 comm="rpcbind" name="crypto" dev="proc" ino=35422 scontext=system_u:system_r:svirt_lxc_net_t:s0:c281,c653 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Jul 10 01:01:59.705000 audit[3037]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7f5f4bda90c0 a2=0 a3=0 items=0 ppid=3018 pid=3037 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="rpcbind" exe="/usr/bin/rpcbind" subj=system_u:system_r:svirt_lxc_net_t:s0:c281,c653 key=(null) Jul 10 01:01:59.705000 audit: PROCTITLE proctitle=2F7573722F7362696E2F72706362696E64002D77 Jul 10 01:01:59.755000 audit[3042]: AVC avc: denied { search } for pid=3042 comm="dbus-daemon" name="crypto" dev="proc" ino=35422 scontext=system_u:system_r:svirt_lxc_net_t:s0:c281,c653 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Jul 10 01:01:59.755000 audit[3042]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7f54f17600c0 a2=0 a3=0 items=0 ppid=3018 pid=3042 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c281,c653 key=(null) Jul 10 01:01:59.755000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65 Jul 10 01:01:59.758000 audit[3043]: AVC avc: denied { watch } for pid=3043 comm="dbus-daemon" path="/usr/share/dbus-1/system.d" dev="overlay" ino=534604 scontext=system_u:system_r:svirt_lxc_net_t:s0:c281,c653 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c281,c653 tclass=dir permissive=0 Jul 10 01:01:59.758000 audit[3043]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6 a1=55893e952b30 a2=2c8 a3=7ffc2238ed0c items=0 ppid=3018 pid=3043 auid=4294967295 uid=81 gid=81 euid=81 suid=81 fsuid=81 egid=81 sgid=81 fsgid=81 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c281,c653 key=(null) Jul 10 01:01:59.758000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65 Jul 10 01:01:59.770000 audit[3044]: AVC avc: denied { read } for pid=3044 comm="ganesha.nfsd" name="overcommit_memory" dev="proc" ino=35460 scontext=system_u:system_r:svirt_lxc_net_t:s0:c281,c653 tcontext=system_u:object_r:sysctl_vm_overcommit_t:s0 tclass=file permissive=0 Jul 10 01:01:59.770000 audit[3044]: SYSCALL arch=c000003e syscall=2 success=no exit=-13 a0=7fab50321320 a1=80000 a2=d a3=7ffe68d36140 items=0 ppid=3018 pid=3044 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c281,c653 key=(null) Jul 10 01:01:59.770000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66 Jul 10 01:01:59.771000 audit[3044]: AVC avc: denied { search } for pid=3044 comm="ganesha.nfsd" name="crypto" dev="proc" ino=35422 scontext=system_u:system_r:svirt_lxc_net_t:s0:c281,c653 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Jul 10 01:01:59.771000 audit[3044]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7fab4f8750c0 a2=0 a3=0 items=0 ppid=3018 pid=3044 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c281,c653 key=(null) Jul 10 01:01:59.771000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66 Jul 10 01:02:00.164119 kubelet[1620]: E0710 01:02:00.164079 1620 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 01:02:00.970435 kernel: kauditd_printk_skb: 122 callbacks suppressed Jul 10 01:02:00.970541 kernel: audit: type=1325 audit(1752109320.967:768): table=filter:80 family=2 entries=20 op=nft_register_rule pid=3085 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 10 01:02:00.967000 audit[3085]: NETFILTER_CFG table=filter:80 family=2 entries=20 op=nft_register_rule pid=3085 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 10 01:02:00.967000 audit[3085]: SYSCALL arch=c000003e syscall=46 success=yes exit=3016 a0=3 a1=7ffc848fbdb0 a2=0 a3=7ffc848fbd9c items=0 ppid=1851 pid=3085 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 01:02:00.975400 kernel: audit: type=1300 audit(1752109320.967:768): arch=c000003e syscall=46 success=yes exit=3016 a0=3 a1=7ffc848fbdb0 a2=0 a3=7ffc848fbd9c items=0 ppid=1851 pid=3085 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 01:02:00.967000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 10 01:02:00.977427 kernel: audit: type=1327 audit(1752109320.967:768): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 10 01:02:00.976000 audit[3085]: NETFILTER_CFG table=nat:81 family=2 entries=110 op=nft_register_chain pid=3085 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 10 01:02:00.976000 audit[3085]: SYSCALL arch=c000003e syscall=46 success=yes exit=50988 a0=3 a1=7ffc848fbdb0 a2=0 a3=7ffc848fbd9c items=0 ppid=1851 pid=3085 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 01:02:00.983948 kernel: audit: type=1325 audit(1752109320.976:769): table=nat:81 family=2 entries=110 op=nft_register_chain pid=3085 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 10 01:02:00.983988 kernel: audit: type=1300 audit(1752109320.976:769): arch=c000003e syscall=46 success=yes exit=50988 a0=3 a1=7ffc848fbdb0 a2=0 a3=7ffc848fbd9c items=0 ppid=1851 pid=3085 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 01:02:00.984010 kernel: audit: type=1327 audit(1752109320.976:769): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 10 01:02:00.976000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 10 01:02:01.052396 kubelet[1620]: E0710 01:02:01.052334 1620 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 01:02:01.164276 kubelet[1620]: E0710 01:02:01.164202 1620 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 01:02:02.164378 kubelet[1620]: E0710 01:02:02.164346 1620 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 01:02:03.164711 kubelet[1620]: E0710 01:02:03.164683 1620 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 01:02:04.165548 kubelet[1620]: E0710 01:02:04.165519 1620 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 01:02:05.166307 kubelet[1620]: E0710 01:02:05.166275 1620 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 01:02:06.166934 kubelet[1620]: E0710 01:02:06.166906 1620 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 01:02:07.167926 kubelet[1620]: E0710 01:02:07.167898 1620 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 01:02:07.676537 kubelet[1620]: I0710 01:02:07.676497 1620 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="default/nfs-server-provisioner-0" podStartSLOduration=12.757061176 podStartE2EDuration="16.676481451s" podCreationTimestamp="2025-07-10 01:01:51 +0000 UTC" firstStartedPulling="2025-07-10 01:01:55.679767474 +0000 UTC m=+135.299511167" lastFinishedPulling="2025-07-10 01:01:59.599187752 +0000 UTC m=+139.218931442" observedRunningTime="2025-07-10 01:02:00.509516245 +0000 UTC m=+140.129259943" watchObservedRunningTime="2025-07-10 01:02:07.676481451 +0000 UTC m=+147.296225148" Jul 10 01:02:07.679674 systemd[1]: Created slice kubepods-besteffort-podb07bd5e6_c5d0_43f4_a9f7_819e0c1bdcf9.slice. Jul 10 01:02:07.776916 kubelet[1620]: I0710 01:02:07.776869 1620 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-wntj9\" (UniqueName: \"kubernetes.io/projected/b07bd5e6-c5d0-43f4-a9f7-819e0c1bdcf9-kube-api-access-wntj9\") pod \"test-pod-1\" (UID: \"b07bd5e6-c5d0-43f4-a9f7-819e0c1bdcf9\") " pod="default/test-pod-1" Jul 10 01:02:07.776916 kubelet[1620]: I0710 01:02:07.776915 1620 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"pvc-3b006a9c-5042-4118-a87f-d89487497312\" (UniqueName: \"kubernetes.io/nfs/b07bd5e6-c5d0-43f4-a9f7-819e0c1bdcf9-pvc-3b006a9c-5042-4118-a87f-d89487497312\") pod \"test-pod-1\" (UID: \"b07bd5e6-c5d0-43f4-a9f7-819e0c1bdcf9\") " pod="default/test-pod-1" Jul 10 01:02:07.901000 audit[3091]: AVC avc: denied { confidentiality } for pid=3091 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 01:02:07.908380 kernel: Failed to create system directory netfs Jul 10 01:02:07.908431 kernel: audit: type=1400 audit(1752109327.901:770): avc: denied { confidentiality } for pid=3091 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 01:02:07.908449 kernel: Failed to create system directory netfs Jul 10 01:02:07.908463 kernel: audit: type=1400 audit(1752109327.901:770): avc: denied { confidentiality } for pid=3091 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 01:02:07.901000 audit[3091]: AVC avc: denied { confidentiality } for pid=3091 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 01:02:07.911605 kernel: Failed to create system directory netfs Jul 10 01:02:07.911632 kernel: audit: type=1400 audit(1752109327.901:770): avc: denied { confidentiality } for pid=3091 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 01:02:07.901000 audit[3091]: AVC avc: denied { confidentiality } for pid=3091 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 01:02:07.914853 kernel: Failed to create system directory netfs Jul 10 01:02:07.914897 kernel: audit: type=1400 audit(1752109327.901:770): avc: denied { confidentiality } for pid=3091 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 01:02:07.901000 audit[3091]: AVC avc: denied { confidentiality } for pid=3091 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 01:02:07.901000 audit[3091]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=5625e3ab35e0 a1=153bc a2=5625b41952b0 a3=5 items=0 ppid=492 pid=3091 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 01:02:07.901000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Jul 10 01:02:07.925000 kernel: audit: type=1300 audit(1752109327.901:770): arch=c000003e syscall=175 success=yes exit=0 a0=5625e3ab35e0 a1=153bc a2=5625b41952b0 a3=5 items=0 ppid=492 pid=3091 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 01:02:07.925043 kernel: audit: type=1327 audit(1752109327.901:770): proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Jul 10 01:02:07.920000 audit[3091]: AVC avc: denied { confidentiality } for pid=3091 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 01:02:07.930002 kernel: Failed to create system directory fscache Jul 10 01:02:07.930042 kernel: audit: type=1400 audit(1752109327.920:771): avc: denied { confidentiality } for pid=3091 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 01:02:07.930061 kernel: Failed to create system directory fscache Jul 10 01:02:07.930076 kernel: audit: type=1400 audit(1752109327.920:771): avc: denied { confidentiality } for pid=3091 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 01:02:07.920000 audit[3091]: AVC avc: denied { confidentiality } for pid=3091 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 01:02:07.933235 kernel: Failed to create system directory fscache Jul 10 01:02:07.933260 kernel: audit: type=1400 audit(1752109327.920:771): avc: denied { confidentiality } for pid=3091 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 01:02:07.920000 audit[3091]: AVC avc: denied { confidentiality } for pid=3091 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 01:02:07.936499 kernel: Failed to create system directory fscache Jul 10 01:02:07.936524 kernel: audit: type=1400 audit(1752109327.920:771): avc: denied { confidentiality } for pid=3091 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 01:02:07.920000 audit[3091]: AVC avc: denied { confidentiality } for pid=3091 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 01:02:07.939143 kernel: Failed to create system directory fscache Jul 10 01:02:07.920000 audit[3091]: AVC avc: denied { confidentiality } for pid=3091 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 01:02:07.920000 audit[3091]: AVC avc: denied { confidentiality } for pid=3091 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 01:02:07.920000 audit[3091]: AVC avc: denied { confidentiality } for pid=3091 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 01:02:07.940960 kernel: Failed to create system directory fscache Jul 10 01:02:07.940989 kernel: Failed to create system directory fscache Jul 10 01:02:07.941003 kernel: Failed to create system directory fscache Jul 10 01:02:07.920000 audit[3091]: AVC avc: denied { confidentiality } for pid=3091 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 01:02:07.920000 audit[3091]: AVC avc: denied { confidentiality } for pid=3091 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 01:02:07.920000 audit[3091]: AVC avc: denied { confidentiality } for pid=3091 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 01:02:07.942825 kernel: Failed to create system directory fscache Jul 10 01:02:07.942861 kernel: Failed to create system directory fscache Jul 10 01:02:07.942881 kernel: Failed to create system directory fscache Jul 10 01:02:07.920000 audit[3091]: AVC avc: denied { confidentiality } for pid=3091 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 01:02:07.920000 audit[3091]: AVC avc: denied { confidentiality } for pid=3091 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 01:02:07.920000 audit[3091]: AVC avc: denied { confidentiality } for pid=3091 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 01:02:07.944698 kernel: Failed to create system directory fscache Jul 10 01:02:07.944726 kernel: Failed to create system directory fscache Jul 10 01:02:07.944740 kernel: Failed to create system directory fscache Jul 10 01:02:07.920000 audit[3091]: AVC avc: denied { confidentiality } for pid=3091 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 01:02:07.920000 audit[3091]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=5625e3cc89c0 a1=4c0fc a2=5625b41952b0 a3=5 items=0 ppid=492 pid=3091 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 01:02:07.920000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Jul 10 01:02:07.947427 kernel: FS-Cache: Loaded Jul 10 01:02:07.961000 audit[3091]: AVC avc: denied { confidentiality } for pid=3091 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 01:02:07.972424 kernel: Failed to create system directory sunrpc Jul 10 01:02:07.961000 audit[3091]: AVC avc: denied { confidentiality } for pid=3091 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 01:02:07.961000 audit[3091]: AVC avc: denied { confidentiality } for pid=3091 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 01:02:07.975490 kernel: Failed to create system directory sunrpc Jul 10 01:02:07.975533 kernel: Failed to create system directory sunrpc Jul 10 01:02:07.975558 kernel: Failed to create system directory sunrpc Jul 10 01:02:07.961000 audit[3091]: AVC avc: denied { confidentiality } for pid=3091 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 01:02:07.961000 audit[3091]: AVC avc: denied { confidentiality } for pid=3091 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 01:02:07.976864 kernel: Failed to create system directory sunrpc Jul 10 01:02:07.976894 kernel: Failed to create system directory sunrpc Jul 10 01:02:07.961000 audit[3091]: AVC avc: denied { confidentiality } for pid=3091 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 01:02:07.961000 audit[3091]: AVC avc: denied { confidentiality } for pid=3091 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 01:02:07.961000 audit[3091]: AVC avc: denied { confidentiality } for pid=3091 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 01:02:07.978826 kernel: Failed to create system directory sunrpc Jul 10 01:02:07.978863 kernel: Failed to create system directory sunrpc Jul 10 01:02:07.978880 kernel: Failed to create system directory sunrpc Jul 10 01:02:07.961000 audit[3091]: AVC avc: denied { confidentiality } for pid=3091 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 01:02:07.961000 audit[3091]: AVC avc: denied { confidentiality } for pid=3091 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 01:02:07.961000 audit[3091]: AVC avc: denied { confidentiality } for pid=3091 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 01:02:07.981135 kernel: Failed to create system directory sunrpc Jul 10 01:02:07.981175 kernel: Failed to create system directory sunrpc Jul 10 01:02:07.981195 kernel: Failed to create system directory sunrpc Jul 10 01:02:07.983425 kernel: Failed to create system directory sunrpc Jul 10 01:02:07.983467 kernel: Failed to create system directory sunrpc Jul 10 01:02:07.983540 kernel: Failed to create system directory sunrpc Jul 10 01:02:07.984294 kernel: Failed to create system directory sunrpc Jul 10 01:02:07.961000 audit[3091]: AVC avc: denied { confidentiality } for pid=3091 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 01:02:07.961000 audit[3091]: AVC avc: denied { confidentiality } for pid=3091 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 01:02:07.961000 audit[3091]: AVC avc: denied { confidentiality } for pid=3091 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 01:02:07.961000 audit[3091]: AVC avc: denied { confidentiality } for pid=3091 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 01:02:07.961000 audit[3091]: AVC avc: denied { confidentiality } for pid=3091 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 01:02:07.985437 kernel: Failed to create system directory sunrpc Jul 10 01:02:07.985468 kernel: Failed to create system directory sunrpc Jul 10 01:02:07.961000 audit[3091]: AVC avc: denied { confidentiality } for pid=3091 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 01:02:07.961000 audit[3091]: AVC avc: denied { confidentiality } for pid=3091 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 01:02:07.961000 audit[3091]: AVC avc: denied { confidentiality } for pid=3091 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 01:02:07.986756 kernel: Failed to create system directory sunrpc Jul 10 01:02:07.986796 kernel: Failed to create system directory sunrpc Jul 10 01:02:07.961000 audit[3091]: AVC avc: denied { confidentiality } for pid=3091 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 01:02:07.987436 kernel: Failed to create system directory sunrpc Jul 10 01:02:07.961000 audit[3091]: AVC avc: denied { confidentiality } for pid=3091 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 01:02:07.961000 audit[3091]: AVC avc: denied { confidentiality } for pid=3091 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 01:02:07.988772 kernel: Failed to create system directory sunrpc Jul 10 01:02:07.988805 kernel: Failed to create system directory sunrpc Jul 10 01:02:07.961000 audit[3091]: AVC avc: denied { confidentiality } for pid=3091 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 01:02:07.961000 audit[3091]: AVC avc: denied { confidentiality } for pid=3091 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 01:02:07.961000 audit[3091]: AVC avc: denied { confidentiality } for pid=3091 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 01:02:07.990928 kernel: Failed to create system directory sunrpc Jul 10 01:02:07.990969 kernel: Failed to create system directory sunrpc Jul 10 01:02:07.990984 kernel: Failed to create system directory sunrpc Jul 10 01:02:07.961000 audit[3091]: AVC avc: denied { confidentiality } for pid=3091 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 01:02:07.991653 kernel: Failed to create system directory sunrpc Jul 10 01:02:07.961000 audit[3091]: AVC avc: denied { confidentiality } for pid=3091 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 01:02:07.961000 audit[3091]: AVC avc: denied { confidentiality } for pid=3091 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 01:02:07.992913 kernel: Failed to create system directory sunrpc Jul 10 01:02:07.992951 kernel: Failed to create system directory sunrpc Jul 10 01:02:07.961000 audit[3091]: AVC avc: denied { confidentiality } for pid=3091 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 01:02:07.961000 audit[3091]: AVC avc: denied { confidentiality } for pid=3091 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 01:02:07.961000 audit[3091]: AVC avc: denied { confidentiality } for pid=3091 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 01:02:07.994893 kernel: Failed to create system directory sunrpc Jul 10 01:02:07.994922 kernel: Failed to create system directory sunrpc Jul 10 01:02:07.994944 kernel: Failed to create system directory sunrpc Jul 10 01:02:07.961000 audit[3091]: AVC avc: denied { confidentiality } for pid=3091 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 01:02:07.961000 audit[3091]: AVC avc: denied { confidentiality } for pid=3091 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 01:02:07.961000 audit[3091]: AVC avc: denied { confidentiality } for pid=3091 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 01:02:07.996814 kernel: Failed to create system directory sunrpc Jul 10 01:02:07.996851 kernel: Failed to create system directory sunrpc Jul 10 01:02:07.996874 kernel: Failed to create system directory sunrpc Jul 10 01:02:07.961000 audit[3091]: AVC avc: denied { confidentiality } for pid=3091 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 01:02:07.997438 kernel: Failed to create system directory sunrpc Jul 10 01:02:07.961000 audit[3091]: AVC avc: denied { confidentiality } for pid=3091 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 01:02:07.961000 audit[3091]: AVC avc: denied { confidentiality } for pid=3091 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 01:02:07.998720 kernel: Failed to create system directory sunrpc Jul 10 01:02:07.998750 kernel: Failed to create system directory sunrpc Jul 10 01:02:07.961000 audit[3091]: AVC avc: denied { confidentiality } for pid=3091 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 01:02:07.961000 audit[3091]: AVC avc: denied { confidentiality } for pid=3091 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 01:02:08.000003 kernel: Failed to create system directory sunrpc Jul 10 01:02:08.000043 kernel: Failed to create system directory sunrpc Jul 10 01:02:07.961000 audit[3091]: AVC avc: denied { confidentiality } for pid=3091 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 01:02:08.000680 kernel: Failed to create system directory sunrpc Jul 10 01:02:07.961000 audit[3091]: AVC avc: denied { confidentiality } for pid=3091 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 01:02:07.961000 audit[3091]: AVC avc: denied { confidentiality } for pid=3091 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 01:02:08.001964 kernel: Failed to create system directory sunrpc Jul 10 01:02:08.002024 kernel: Failed to create system directory sunrpc Jul 10 01:02:07.961000 audit[3091]: AVC avc: denied { confidentiality } for pid=3091 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 01:02:07.961000 audit[3091]: AVC avc: denied { confidentiality } for pid=3091 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 01:02:07.961000 audit[3091]: AVC avc: denied { confidentiality } for pid=3091 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 01:02:08.003779 kernel: Failed to create system directory sunrpc Jul 10 01:02:08.003807 kernel: Failed to create system directory sunrpc Jul 10 01:02:08.003825 kernel: Failed to create system directory sunrpc Jul 10 01:02:07.961000 audit[3091]: AVC avc: denied { confidentiality } for pid=3091 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 01:02:07.961000 audit[3091]: AVC avc: denied { confidentiality } for pid=3091 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 01:02:08.004993 kernel: Failed to create system directory sunrpc Jul 10 01:02:08.005017 kernel: Failed to create system directory sunrpc Jul 10 01:02:07.961000 audit[3091]: AVC avc: denied { confidentiality } for pid=3091 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 01:02:07.961000 audit[3091]: AVC avc: denied { confidentiality } for pid=3091 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 01:02:07.961000 audit[3091]: AVC avc: denied { confidentiality } for pid=3091 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 01:02:08.006793 kernel: Failed to create system directory sunrpc Jul 10 01:02:08.006820 kernel: Failed to create system directory sunrpc Jul 10 01:02:08.006836 kernel: Failed to create system directory sunrpc Jul 10 01:02:07.961000 audit[3091]: AVC avc: denied { confidentiality } for pid=3091 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 01:02:07.961000 audit[3091]: AVC avc: denied { confidentiality } for pid=3091 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 01:02:08.007995 kernel: Failed to create system directory sunrpc Jul 10 01:02:08.008022 kernel: Failed to create system directory sunrpc Jul 10 01:02:07.961000 audit[3091]: AVC avc: denied { confidentiality } for pid=3091 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 01:02:07.961000 audit[3091]: AVC avc: denied { confidentiality } for pid=3091 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 01:02:07.961000 audit[3091]: AVC avc: denied { confidentiality } for pid=3091 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 01:02:08.009810 kernel: Failed to create system directory sunrpc Jul 10 01:02:08.009837 kernel: Failed to create system directory sunrpc Jul 10 01:02:08.009850 kernel: Failed to create system directory sunrpc Jul 10 01:02:07.961000 audit[3091]: AVC avc: denied { confidentiality } for pid=3091 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 01:02:08.010431 kernel: Failed to create system directory sunrpc Jul 10 01:02:07.961000 audit[3091]: AVC avc: denied { confidentiality } for pid=3091 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 01:02:07.961000 audit[3091]: AVC avc: denied { confidentiality } for pid=3091 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 01:02:08.011624 kernel: Failed to create system directory sunrpc Jul 10 01:02:08.038153 kernel: Failed to create system directory sunrpc Jul 10 01:02:08.038190 kernel: Failed to create system directory sunrpc Jul 10 01:02:08.038211 kernel: Failed to create system directory sunrpc Jul 10 01:02:08.038226 kernel: Failed to create system directory sunrpc Jul 10 01:02:08.038236 kernel: Failed to create system directory sunrpc Jul 10 01:02:08.038251 kernel: Failed to create system directory sunrpc Jul 10 01:02:08.038265 kernel: Failed to create system directory sunrpc Jul 10 01:02:08.038277 kernel: Failed to create system directory sunrpc Jul 10 01:02:08.038291 kernel: Failed to create system directory sunrpc Jul 10 01:02:08.038309 kernel: Failed to create system directory sunrpc Jul 10 01:02:08.038328 kernel: Failed to create system directory sunrpc Jul 10 01:02:08.038347 kernel: Failed to create system directory sunrpc Jul 10 01:02:08.038367 kernel: Failed to create system directory sunrpc Jul 10 01:02:08.038392 kernel: Failed to create system directory sunrpc Jul 10 01:02:08.038406 kernel: Failed to create system directory sunrpc Jul 10 01:02:08.038435 kernel: Failed to create system directory sunrpc Jul 10 01:02:08.038446 kernel: Failed to create system directory sunrpc Jul 10 01:02:08.038459 kernel: Failed to create system directory sunrpc Jul 10 01:02:08.038472 kernel: Failed to create system directory sunrpc Jul 10 01:02:08.038484 kernel: Failed to create system directory sunrpc Jul 10 01:02:08.038498 kernel: Failed to create system directory sunrpc Jul 10 01:02:08.038511 kernel: Failed to create system directory sunrpc Jul 10 01:02:08.038522 kernel: Failed to create system directory sunrpc Jul 10 01:02:08.038538 kernel: Failed to create system directory sunrpc Jul 10 01:02:08.038553 kernel: Failed to create system directory sunrpc Jul 10 01:02:08.038566 kernel: Failed to create system directory sunrpc Jul 10 01:02:08.038579 kernel: Failed to create system directory sunrpc Jul 10 01:02:08.038592 kernel: Failed to create system directory sunrpc Jul 10 01:02:08.038604 kernel: Failed to create system directory sunrpc Jul 10 01:02:08.038617 kernel: Failed to create system directory sunrpc Jul 10 01:02:08.038640 kernel: Failed to create system directory sunrpc Jul 10 01:02:08.038654 kernel: Failed to create system directory sunrpc Jul 10 01:02:08.038665 kernel: Failed to create system directory sunrpc Jul 10 01:02:08.038679 kernel: Failed to create system directory sunrpc Jul 10 01:02:08.038692 kernel: Failed to create system directory sunrpc Jul 10 01:02:08.038706 kernel: Failed to create system directory sunrpc Jul 10 01:02:08.038718 kernel: Failed to create system directory sunrpc Jul 10 01:02:08.038731 kernel: Failed to create system directory sunrpc Jul 10 01:02:08.038745 kernel: Failed to create system directory sunrpc Jul 10 01:02:08.038759 kernel: Failed to create system directory sunrpc Jul 10 01:02:08.038770 kernel: Failed to create system directory sunrpc Jul 10 01:02:08.038780 kernel: Failed to create system directory sunrpc Jul 10 01:02:08.038792 kernel: Failed to create system directory sunrpc Jul 10 01:02:08.038804 kernel: Failed to create system directory sunrpc Jul 10 01:02:08.038817 kernel: Failed to create system directory sunrpc Jul 10 01:02:07.961000 audit[3091]: AVC avc: denied { confidentiality } for pid=3091 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 01:02:07.961000 audit[3091]: AVC avc: denied { confidentiality } for pid=3091 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 01:02:07.961000 audit[3091]: AVC avc: denied { confidentiality } for pid=3091 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 01:02:07.961000 audit[3091]: AVC avc: denied { confidentiality } for pid=3091 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 01:02:07.961000 audit[3091]: AVC avc: denied { confidentiality } for pid=3091 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 01:02:07.961000 audit[3091]: AVC avc: denied { confidentiality } for pid=3091 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 01:02:07.961000 audit[3091]: AVC avc: denied { confidentiality } for pid=3091 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 01:02:08.038997 kernel: Failed to create system directory sunrpc Jul 10 01:02:07.961000 audit[3091]: AVC avc: denied { confidentiality } for pid=3091 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 01:02:07.961000 audit[3091]: AVC avc: denied { confidentiality } for pid=3091 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 01:02:07.961000 audit[3091]: AVC avc: denied { confidentiality } for pid=3091 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 01:02:07.961000 audit[3091]: AVC avc: denied { confidentiality } for pid=3091 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 01:02:07.961000 audit[3091]: AVC avc: denied { confidentiality } for pid=3091 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 01:02:07.961000 audit[3091]: AVC avc: denied { confidentiality } for pid=3091 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 01:02:07.961000 audit[3091]: AVC avc: denied { confidentiality } for pid=3091 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 01:02:07.961000 audit[3091]: AVC avc: denied { confidentiality } for pid=3091 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 01:02:07.961000 audit[3091]: AVC avc: denied { confidentiality } for pid=3091 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 01:02:07.961000 audit[3091]: AVC avc: denied { confidentiality } for pid=3091 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 01:02:07.961000 audit[3091]: AVC avc: denied { confidentiality } for pid=3091 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 01:02:07.961000 audit[3091]: AVC avc: denied { confidentiality } for pid=3091 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 01:02:07.961000 audit[3091]: AVC avc: denied { confidentiality } for pid=3091 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 01:02:07.961000 audit[3091]: AVC avc: denied { confidentiality } for pid=3091 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 01:02:07.961000 audit[3091]: AVC avc: denied { confidentiality } for pid=3091 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 01:02:07.961000 audit[3091]: AVC avc: denied { confidentiality } for pid=3091 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 01:02:07.961000 audit[3091]: AVC avc: denied { confidentiality } for pid=3091 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 01:02:07.961000 audit[3091]: AVC avc: denied { confidentiality } for pid=3091 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 01:02:07.961000 audit[3091]: AVC avc: denied { confidentiality } for pid=3091 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 01:02:07.961000 audit[3091]: AVC avc: denied { confidentiality } for pid=3091 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 01:02:07.961000 audit[3091]: AVC avc: denied { confidentiality } for pid=3091 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 01:02:07.961000 audit[3091]: AVC avc: denied { confidentiality } for pid=3091 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 01:02:07.961000 audit[3091]: AVC avc: denied { confidentiality } for pid=3091 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 01:02:07.961000 audit[3091]: AVC avc: denied { confidentiality } for pid=3091 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 01:02:07.961000 audit[3091]: AVC avc: denied { confidentiality } for pid=3091 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 01:02:07.961000 audit[3091]: AVC avc: denied { confidentiality } for pid=3091 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 01:02:07.961000 audit[3091]: AVC avc: denied { confidentiality } for pid=3091 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 01:02:07.961000 audit[3091]: AVC avc: denied { confidentiality } for pid=3091 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 01:02:07.961000 audit[3091]: AVC avc: denied { confidentiality } for pid=3091 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 01:02:07.961000 audit[3091]: AVC avc: denied { confidentiality } for pid=3091 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 01:02:08.039603 kernel: Failed to create system directory sunrpc Jul 10 01:02:07.961000 audit[3091]: AVC avc: denied { confidentiality } for pid=3091 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 01:02:07.961000 audit[3091]: AVC avc: denied { confidentiality } for pid=3091 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 01:02:07.961000 audit[3091]: AVC avc: denied { confidentiality } for pid=3091 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 01:02:07.961000 audit[3091]: AVC avc: denied { confidentiality } for pid=3091 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 01:02:07.961000 audit[3091]: AVC avc: denied { confidentiality } for pid=3091 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 01:02:07.961000 audit[3091]: AVC avc: denied { confidentiality } for pid=3091 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 01:02:07.961000 audit[3091]: AVC avc: denied { confidentiality } for pid=3091 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 01:02:07.961000 audit[3091]: AVC avc: denied { confidentiality } for pid=3091 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 01:02:07.961000 audit[3091]: AVC avc: denied { confidentiality } for pid=3091 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 01:02:07.961000 audit[3091]: AVC avc: denied { confidentiality } for pid=3091 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 01:02:07.961000 audit[3091]: AVC avc: denied { confidentiality } for pid=3091 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 01:02:08.040800 kernel: Failed to create system directory sunrpc Jul 10 01:02:08.040836 kernel: Failed to create system directory sunrpc Jul 10 01:02:07.961000 audit[3091]: AVC avc: denied { confidentiality } for pid=3091 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 01:02:07.961000 audit[3091]: AVC avc: denied { confidentiality } for pid=3091 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 01:02:08.042011 kernel: Failed to create system directory sunrpc Jul 10 01:02:08.042037 kernel: Failed to create system directory sunrpc Jul 10 01:02:07.961000 audit[3091]: AVC avc: denied { confidentiality } for pid=3091 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 01:02:07.961000 audit[3091]: AVC avc: denied { confidentiality } for pid=3091 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 01:02:07.961000 audit[3091]: AVC avc: denied { confidentiality } for pid=3091 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 01:02:08.043812 kernel: Failed to create system directory sunrpc Jul 10 01:02:08.043844 kernel: Failed to create system directory sunrpc Jul 10 01:02:08.043858 kernel: Failed to create system directory sunrpc Jul 10 01:02:07.961000 audit[3091]: AVC avc: denied { confidentiality } for pid=3091 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 01:02:08.044431 kernel: Failed to create system directory sunrpc Jul 10 01:02:07.961000 audit[3091]: AVC avc: denied { confidentiality } for pid=3091 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 01:02:07.961000 audit[3091]: AVC avc: denied { confidentiality } for pid=3091 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 01:02:08.045631 kernel: Failed to create system directory sunrpc Jul 10 01:02:08.045665 kernel: Failed to create system directory sunrpc Jul 10 01:02:07.961000 audit[3091]: AVC avc: denied { confidentiality } for pid=3091 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 01:02:07.961000 audit[3091]: AVC avc: denied { confidentiality } for pid=3091 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 01:02:08.046822 kernel: Failed to create system directory sunrpc Jul 10 01:02:08.046858 kernel: Failed to create system directory sunrpc Jul 10 01:02:07.961000 audit[3091]: AVC avc: denied { confidentiality } for pid=3091 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 01:02:07.961000 audit[3091]: AVC avc: denied { confidentiality } for pid=3091 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 01:02:07.961000 audit[3091]: AVC avc: denied { confidentiality } for pid=3091 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 01:02:08.048632 kernel: Failed to create system directory sunrpc Jul 10 01:02:08.048668 kernel: Failed to create system directory sunrpc Jul 10 01:02:08.048685 kernel: Failed to create system directory sunrpc Jul 10 01:02:07.961000 audit[3091]: AVC avc: denied { confidentiality } for pid=3091 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 01:02:07.961000 audit[3091]: AVC avc: denied { confidentiality } for pid=3091 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 01:02:08.049852 kernel: Failed to create system directory sunrpc Jul 10 01:02:08.049884 kernel: Failed to create system directory sunrpc Jul 10 01:02:07.961000 audit[3091]: AVC avc: denied { confidentiality } for pid=3091 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 01:02:07.961000 audit[3091]: AVC avc: denied { confidentiality } for pid=3091 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 01:02:07.961000 audit[3091]: AVC avc: denied { confidentiality } for pid=3091 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 01:02:08.051752 kernel: Failed to create system directory sunrpc Jul 10 01:02:08.051783 kernel: Failed to create system directory sunrpc Jul 10 01:02:08.051829 kernel: Failed to create system directory sunrpc Jul 10 01:02:07.961000 audit[3091]: AVC avc: denied { confidentiality } for pid=3091 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 01:02:07.961000 audit[3091]: AVC avc: denied { confidentiality } for pid=3091 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 01:02:08.052998 kernel: Failed to create system directory sunrpc Jul 10 01:02:08.059748 kernel: RPC: Registered named UNIX socket transport module. Jul 10 01:02:08.059850 kernel: RPC: Registered udp transport module. Jul 10 01:02:08.059880 kernel: RPC: Registered tcp transport module. Jul 10 01:02:08.061093 kernel: RPC: Registered tcp NFSv4.1 backchannel transport module. Jul 10 01:02:07.961000 audit[3091]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=5625e3d14ad0 a1=1a81bc a2=5625b41952b0 a3=5 items=6 ppid=492 pid=3091 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 01:02:07.961000 audit: CWD cwd="/" Jul 10 01:02:07.961000 audit: PATH item=0 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 01:02:07.961000 audit: PATH item=1 name=(null) inode=35692 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 01:02:07.961000 audit: PATH item=2 name=(null) inode=35692 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 01:02:07.961000 audit: PATH item=3 name=(null) inode=35693 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 01:02:07.961000 audit: PATH item=4 name=(null) inode=35692 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 01:02:07.961000 audit: PATH item=5 name=(null) inode=35694 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 01:02:07.961000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Jul 10 01:02:08.126000 audit[3091]: AVC avc: denied { confidentiality } for pid=3091 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 01:02:08.126000 audit[3091]: AVC avc: denied { confidentiality } for pid=3091 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 01:02:08.136792 kernel: Failed to create system directory nfs Jul 10 01:02:08.136826 kernel: Failed to create system directory nfs Jul 10 01:02:08.136844 kernel: Failed to create system directory nfs Jul 10 01:02:08.126000 audit[3091]: AVC avc: denied { confidentiality } for pid=3091 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 01:02:08.126000 audit[3091]: AVC avc: denied { confidentiality } for pid=3091 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 01:02:08.137989 kernel: Failed to create system directory nfs Jul 10 01:02:08.138023 kernel: Failed to create system directory nfs Jul 10 01:02:08.126000 audit[3091]: AVC avc: denied { confidentiality } for pid=3091 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 01:02:08.126000 audit[3091]: AVC avc: denied { confidentiality } for pid=3091 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 01:02:08.126000 audit[3091]: AVC avc: denied { confidentiality } for pid=3091 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 01:02:08.139863 kernel: Failed to create system directory nfs Jul 10 01:02:08.139895 kernel: Failed to create system directory nfs Jul 10 01:02:08.139908 kernel: Failed to create system directory nfs Jul 10 01:02:08.126000 audit[3091]: AVC avc: denied { confidentiality } for pid=3091 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 01:02:08.126000 audit[3091]: AVC avc: denied { confidentiality } for pid=3091 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 01:02:08.126000 audit[3091]: AVC avc: denied { confidentiality } for pid=3091 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 01:02:08.141644 kernel: Failed to create system directory nfs Jul 10 01:02:08.141676 kernel: Failed to create system directory nfs Jul 10 01:02:08.141694 kernel: Failed to create system directory nfs Jul 10 01:02:08.126000 audit[3091]: AVC avc: denied { confidentiality } for pid=3091 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 01:02:08.126000 audit[3091]: AVC avc: denied { confidentiality } for pid=3091 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 01:02:08.142797 kernel: Failed to create system directory nfs Jul 10 01:02:08.142828 kernel: Failed to create system directory nfs Jul 10 01:02:08.126000 audit[3091]: AVC avc: denied { confidentiality } for pid=3091 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 01:02:08.126000 audit[3091]: AVC avc: denied { confidentiality } for pid=3091 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 01:02:08.143995 kernel: Failed to create system directory nfs Jul 10 01:02:08.144019 kernel: Failed to create system directory nfs Jul 10 01:02:08.126000 audit[3091]: AVC avc: denied { confidentiality } for pid=3091 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 01:02:08.126000 audit[3091]: AVC avc: denied { confidentiality } for pid=3091 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 01:02:08.126000 audit[3091]: AVC avc: denied { confidentiality } for pid=3091 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 01:02:08.145777 kernel: Failed to create system directory nfs Jul 10 01:02:08.145805 kernel: Failed to create system directory nfs Jul 10 01:02:08.145820 kernel: Failed to create system directory nfs Jul 10 01:02:08.126000 audit[3091]: AVC avc: denied { confidentiality } for pid=3091 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 01:02:08.126000 audit[3091]: AVC avc: denied { confidentiality } for pid=3091 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 01:02:08.146928 kernel: Failed to create system directory nfs Jul 10 01:02:08.146949 kernel: Failed to create system directory nfs Jul 10 01:02:08.126000 audit[3091]: AVC avc: denied { confidentiality } for pid=3091 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 01:02:08.126000 audit[3091]: AVC avc: denied { confidentiality } for pid=3091 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 01:02:08.126000 audit[3091]: AVC avc: denied { confidentiality } for pid=3091 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 01:02:08.148768 kernel: Failed to create system directory nfs Jul 10 01:02:08.148802 kernel: Failed to create system directory nfs Jul 10 01:02:08.148818 kernel: Failed to create system directory nfs Jul 10 01:02:08.126000 audit[3091]: AVC avc: denied { confidentiality } for pid=3091 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 01:02:08.126000 audit[3091]: AVC avc: denied { confidentiality } for pid=3091 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 01:02:08.149854 kernel: Failed to create system directory nfs Jul 10 01:02:08.149879 kernel: Failed to create system directory nfs Jul 10 01:02:08.126000 audit[3091]: AVC avc: denied { confidentiality } for pid=3091 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 01:02:08.126000 audit[3091]: AVC avc: denied { confidentiality } for pid=3091 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 01:02:08.151027 kernel: Failed to create system directory nfs Jul 10 01:02:08.151048 kernel: Failed to create system directory nfs Jul 10 01:02:08.126000 audit[3091]: AVC avc: denied { confidentiality } for pid=3091 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 01:02:08.151588 kernel: Failed to create system directory nfs Jul 10 01:02:08.126000 audit[3091]: AVC avc: denied { confidentiality } for pid=3091 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 01:02:08.126000 audit[3091]: AVC avc: denied { confidentiality } for pid=3091 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 01:02:08.152749 kernel: Failed to create system directory nfs Jul 10 01:02:08.152770 kernel: Failed to create system directory nfs Jul 10 01:02:08.126000 audit[3091]: AVC avc: denied { confidentiality } for pid=3091 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 01:02:08.126000 audit[3091]: AVC avc: denied { confidentiality } for pid=3091 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 01:02:08.153933 kernel: Failed to create system directory nfs Jul 10 01:02:08.153955 kernel: Failed to create system directory nfs Jul 10 01:02:08.126000 audit[3091]: AVC avc: denied { confidentiality } for pid=3091 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 01:02:08.126000 audit[3091]: AVC avc: denied { confidentiality } for pid=3091 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 01:02:08.126000 audit[3091]: AVC avc: denied { confidentiality } for pid=3091 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 01:02:08.155673 kernel: Failed to create system directory nfs Jul 10 01:02:08.155702 kernel: Failed to create system directory nfs Jul 10 01:02:08.155716 kernel: Failed to create system directory nfs Jul 10 01:02:08.126000 audit[3091]: AVC avc: denied { confidentiality } for pid=3091 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 01:02:08.126000 audit[3091]: AVC avc: denied { confidentiality } for pid=3091 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 01:02:08.156866 kernel: Failed to create system directory nfs Jul 10 01:02:08.156907 kernel: Failed to create system directory nfs Jul 10 01:02:08.126000 audit[3091]: AVC avc: denied { confidentiality } for pid=3091 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 01:02:08.126000 audit[3091]: AVC avc: denied { confidentiality } for pid=3091 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 01:02:08.158006 kernel: Failed to create system directory nfs Jul 10 01:02:08.158030 kernel: Failed to create system directory nfs Jul 10 01:02:08.126000 audit[3091]: AVC avc: denied { confidentiality } for pid=3091 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 01:02:08.126000 audit[3091]: AVC avc: denied { confidentiality } for pid=3091 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 01:02:08.126000 audit[3091]: AVC avc: denied { confidentiality } for pid=3091 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 01:02:08.159780 kernel: Failed to create system directory nfs Jul 10 01:02:08.159808 kernel: Failed to create system directory nfs Jul 10 01:02:08.159841 kernel: Failed to create system directory nfs Jul 10 01:02:08.126000 audit[3091]: AVC avc: denied { confidentiality } for pid=3091 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 01:02:08.126000 audit[3091]: AVC avc: denied { confidentiality } for pid=3091 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 01:02:08.160904 kernel: Failed to create system directory nfs Jul 10 01:02:08.160932 kernel: Failed to create system directory nfs Jul 10 01:02:08.126000 audit[3091]: AVC avc: denied { confidentiality } for pid=3091 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 01:02:08.161494 kernel: Failed to create system directory nfs Jul 10 01:02:08.126000 audit[3091]: AVC avc: denied { confidentiality } for pid=3091 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 01:02:08.126000 audit[3091]: AVC avc: denied { confidentiality } for pid=3091 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 01:02:08.162664 kernel: Failed to create system directory nfs Jul 10 01:02:08.162690 kernel: Failed to create system directory nfs Jul 10 01:02:08.126000 audit[3091]: AVC avc: denied { confidentiality } for pid=3091 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 01:02:08.126000 audit[3091]: AVC avc: denied { confidentiality } for pid=3091 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 01:02:08.163815 kernel: Failed to create system directory nfs Jul 10 01:02:08.163839 kernel: Failed to create system directory nfs Jul 10 01:02:08.126000 audit[3091]: AVC avc: denied { confidentiality } for pid=3091 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 01:02:08.126000 audit[3091]: AVC avc: denied { confidentiality } for pid=3091 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 01:02:08.164972 kernel: Failed to create system directory nfs Jul 10 01:02:08.165001 kernel: Failed to create system directory nfs Jul 10 01:02:08.126000 audit[3091]: AVC avc: denied { confidentiality } for pid=3091 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 01:02:08.126000 audit[3091]: AVC avc: denied { confidentiality } for pid=3091 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 01:02:08.126000 audit[3091]: AVC avc: denied { confidentiality } for pid=3091 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 01:02:08.166713 kernel: Failed to create system directory nfs Jul 10 01:02:08.166733 kernel: Failed to create system directory nfs Jul 10 01:02:08.166749 kernel: Failed to create system directory nfs Jul 10 01:02:08.126000 audit[3091]: AVC avc: denied { confidentiality } for pid=3091 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 01:02:08.126000 audit[3091]: AVC avc: denied { confidentiality } for pid=3091 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 01:02:08.167874 kernel: Failed to create system directory nfs Jul 10 01:02:08.167896 kernel: Failed to create system directory nfs Jul 10 01:02:08.126000 audit[3091]: AVC avc: denied { confidentiality } for pid=3091 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 01:02:08.168501 kernel: Failed to create system directory nfs Jul 10 01:02:08.126000 audit[3091]: AVC avc: denied { confidentiality } for pid=3091 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 01:02:08.168546 kubelet[1620]: E0710 01:02:08.168460 1620 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 01:02:08.126000 audit[3091]: AVC avc: denied { confidentiality } for pid=3091 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 01:02:08.169652 kernel: Failed to create system directory nfs Jul 10 01:02:08.169683 kernel: Failed to create system directory nfs Jul 10 01:02:08.126000 audit[3091]: AVC avc: denied { confidentiality } for pid=3091 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 01:02:08.126000 audit[3091]: AVC avc: denied { confidentiality } for pid=3091 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 01:02:08.170862 kernel: Failed to create system directory nfs Jul 10 01:02:08.126000 audit[3091]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=5625e3f35af0 a1=16ec44 a2=5625b41952b0 a3=5 items=0 ppid=492 pid=3091 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 01:02:08.126000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Jul 10 01:02:08.184445 kernel: FS-Cache: Netfs 'nfs' registered for caching Jul 10 01:02:08.227000 audit[3099]: AVC avc: denied { confidentiality } for pid=3099 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 01:02:08.238835 kernel: Failed to create system directory nfs4 Jul 10 01:02:08.238882 kernel: Failed to create system directory nfs4 Jul 10 01:02:08.238908 kernel: Failed to create system directory nfs4 Jul 10 01:02:08.227000 audit[3099]: AVC avc: denied { confidentiality } for pid=3099 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 01:02:08.227000 audit[3099]: AVC avc: denied { confidentiality } for pid=3099 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 01:02:08.227000 audit[3099]: AVC avc: denied { confidentiality } for pid=3099 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 01:02:08.227000 audit[3099]: AVC avc: denied { confidentiality } for pid=3099 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 01:02:08.240800 kernel: Failed to create system directory nfs4 Jul 10 01:02:08.240829 kernel: Failed to create system directory nfs4 Jul 10 01:02:08.240852 kernel: Failed to create system directory nfs4 Jul 10 01:02:08.227000 audit[3099]: AVC avc: denied { confidentiality } for pid=3099 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 01:02:08.227000 audit[3099]: AVC avc: denied { confidentiality } for pid=3099 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 01:02:08.227000 audit[3099]: AVC avc: denied { confidentiality } for pid=3099 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 01:02:08.242901 kernel: Failed to create system directory nfs4 Jul 10 01:02:08.242929 kernel: Failed to create system directory nfs4 Jul 10 01:02:08.242946 kernel: Failed to create system directory nfs4 Jul 10 01:02:08.227000 audit[3099]: AVC avc: denied { confidentiality } for pid=3099 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 01:02:08.227000 audit[3099]: AVC avc: denied { confidentiality } for pid=3099 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 01:02:08.227000 audit[3099]: AVC avc: denied { confidentiality } for pid=3099 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 01:02:08.244804 kernel: Failed to create system directory nfs4 Jul 10 01:02:08.244827 kernel: Failed to create system directory nfs4 Jul 10 01:02:08.244838 kernel: Failed to create system directory nfs4 Jul 10 01:02:08.227000 audit[3099]: AVC avc: denied { confidentiality } for pid=3099 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 01:02:08.227000 audit[3099]: AVC avc: denied { confidentiality } for pid=3099 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 01:02:08.227000 audit[3099]: AVC avc: denied { confidentiality } for pid=3099 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 01:02:08.246678 kernel: Failed to create system directory nfs4 Jul 10 01:02:08.246701 kernel: Failed to create system directory nfs4 Jul 10 01:02:08.246716 kernel: Failed to create system directory nfs4 Jul 10 01:02:08.227000 audit[3099]: AVC avc: denied { confidentiality } for pid=3099 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 01:02:08.227000 audit[3099]: AVC avc: denied { confidentiality } for pid=3099 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 01:02:08.247893 kernel: Failed to create system directory nfs4 Jul 10 01:02:08.247917 kernel: Failed to create system directory nfs4 Jul 10 01:02:08.227000 audit[3099]: AVC avc: denied { confidentiality } for pid=3099 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 01:02:08.227000 audit[3099]: AVC avc: denied { confidentiality } for pid=3099 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 01:02:08.227000 audit[3099]: AVC avc: denied { confidentiality } for pid=3099 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 01:02:08.249730 kernel: Failed to create system directory nfs4 Jul 10 01:02:08.249757 kernel: Failed to create system directory nfs4 Jul 10 01:02:08.249772 kernel: Failed to create system directory nfs4 Jul 10 01:02:08.227000 audit[3099]: AVC avc: denied { confidentiality } for pid=3099 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 01:02:08.227000 audit[3099]: AVC avc: denied { confidentiality } for pid=3099 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 01:02:08.250941 kernel: Failed to create system directory nfs4 Jul 10 01:02:08.250965 kernel: Failed to create system directory nfs4 Jul 10 01:02:08.227000 audit[3099]: AVC avc: denied { confidentiality } for pid=3099 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 01:02:08.227000 audit[3099]: AVC avc: denied { confidentiality } for pid=3099 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 01:02:08.227000 audit[3099]: AVC avc: denied { confidentiality } for pid=3099 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 01:02:08.252761 kernel: Failed to create system directory nfs4 Jul 10 01:02:08.252787 kernel: Failed to create system directory nfs4 Jul 10 01:02:08.252801 kernel: Failed to create system directory nfs4 Jul 10 01:02:08.227000 audit[3099]: AVC avc: denied { confidentiality } for pid=3099 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 01:02:08.227000 audit[3099]: AVC avc: denied { confidentiality } for pid=3099 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 01:02:08.253949 kernel: Failed to create system directory nfs4 Jul 10 01:02:08.253972 kernel: Failed to create system directory nfs4 Jul 10 01:02:08.227000 audit[3099]: AVC avc: denied { confidentiality } for pid=3099 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 01:02:08.227000 audit[3099]: AVC avc: denied { confidentiality } for pid=3099 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 01:02:08.227000 audit[3099]: AVC avc: denied { confidentiality } for pid=3099 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 01:02:08.256083 kernel: Failed to create system directory nfs4 Jul 10 01:02:08.256112 kernel: Failed to create system directory nfs4 Jul 10 01:02:08.256129 kernel: Failed to create system directory nfs4 Jul 10 01:02:08.227000 audit[3099]: AVC avc: denied { confidentiality } for pid=3099 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 01:02:08.227000 audit[3099]: AVC avc: denied { confidentiality } for pid=3099 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 01:02:08.257434 kernel: Failed to create system directory nfs4 Jul 10 01:02:08.262991 kernel: Failed to create system directory nfs4 Jul 10 01:02:08.263011 kernel: Failed to create system directory nfs4 Jul 10 01:02:08.263022 kernel: Failed to create system directory nfs4 Jul 10 01:02:08.263035 kernel: Failed to create system directory nfs4 Jul 10 01:02:08.263046 kernel: Failed to create system directory nfs4 Jul 10 01:02:08.263056 kernel: Failed to create system directory nfs4 Jul 10 01:02:08.263114 kernel: Failed to create system directory nfs4 Jul 10 01:02:08.263136 kernel: Failed to create system directory nfs4 Jul 10 01:02:08.263154 kernel: Failed to create system directory nfs4 Jul 10 01:02:08.263168 kernel: Failed to create system directory nfs4 Jul 10 01:02:08.227000 audit[3099]: AVC avc: denied { confidentiality } for pid=3099 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 01:02:08.227000 audit[3099]: AVC avc: denied { confidentiality } for pid=3099 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 01:02:08.227000 audit[3099]: AVC avc: denied { confidentiality } for pid=3099 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 01:02:08.227000 audit[3099]: AVC avc: denied { confidentiality } for pid=3099 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 01:02:08.227000 audit[3099]: AVC avc: denied { confidentiality } for pid=3099 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 01:02:08.227000 audit[3099]: AVC avc: denied { confidentiality } for pid=3099 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 01:02:08.227000 audit[3099]: AVC avc: denied { confidentiality } for pid=3099 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 01:02:08.227000 audit[3099]: AVC avc: denied { confidentiality } for pid=3099 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 01:02:08.227000 audit[3099]: AVC avc: denied { confidentiality } for pid=3099 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 01:02:08.227000 audit[3099]: AVC avc: denied { confidentiality } for pid=3099 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 01:02:08.227000 audit[3099]: AVC avc: denied { confidentiality } for pid=3099 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 01:02:08.227000 audit[3099]: AVC avc: denied { confidentiality } for pid=3099 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 01:02:08.264769 kernel: Failed to create system directory nfs4 Jul 10 01:02:08.264803 kernel: Failed to create system directory nfs4 Jul 10 01:02:08.264825 kernel: Failed to create system directory nfs4 Jul 10 01:02:08.227000 audit[3099]: AVC avc: denied { confidentiality } for pid=3099 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 01:02:08.227000 audit[3099]: AVC avc: denied { confidentiality } for pid=3099 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 01:02:08.265954 kernel: Failed to create system directory nfs4 Jul 10 01:02:08.265982 kernel: Failed to create system directory nfs4 Jul 10 01:02:08.227000 audit[3099]: AVC avc: denied { confidentiality } for pid=3099 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 01:02:08.227000 audit[3099]: AVC avc: denied { confidentiality } for pid=3099 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 01:02:08.227000 audit[3099]: AVC avc: denied { confidentiality } for pid=3099 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 01:02:08.267750 kernel: Failed to create system directory nfs4 Jul 10 01:02:08.267781 kernel: Failed to create system directory nfs4 Jul 10 01:02:08.267797 kernel: Failed to create system directory nfs4 Jul 10 01:02:08.227000 audit[3099]: AVC avc: denied { confidentiality } for pid=3099 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 01:02:08.227000 audit[3099]: AVC avc: denied { confidentiality } for pid=3099 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 01:02:08.268951 kernel: Failed to create system directory nfs4 Jul 10 01:02:08.268980 kernel: Failed to create system directory nfs4 Jul 10 01:02:08.227000 audit[3099]: AVC avc: denied { confidentiality } for pid=3099 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 01:02:08.227000 audit[3099]: AVC avc: denied { confidentiality } for pid=3099 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 01:02:08.227000 audit[3099]: AVC avc: denied { confidentiality } for pid=3099 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 01:02:08.270792 kernel: Failed to create system directory nfs4 Jul 10 01:02:08.270820 kernel: Failed to create system directory nfs4 Jul 10 01:02:08.270841 kernel: Failed to create system directory nfs4 Jul 10 01:02:08.227000 audit[3099]: AVC avc: denied { confidentiality } for pid=3099 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 01:02:08.227000 audit[3099]: AVC avc: denied { confidentiality } for pid=3099 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 01:02:08.271981 kernel: Failed to create system directory nfs4 Jul 10 01:02:08.272015 kernel: Failed to create system directory nfs4 Jul 10 01:02:08.227000 audit[3099]: AVC avc: denied { confidentiality } for pid=3099 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 01:02:08.227000 audit[3099]: AVC avc: denied { confidentiality } for pid=3099 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 01:02:08.227000 audit[3099]: AVC avc: denied { confidentiality } for pid=3099 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 01:02:08.273787 kernel: Failed to create system directory nfs4 Jul 10 01:02:08.273818 kernel: Failed to create system directory nfs4 Jul 10 01:02:08.273836 kernel: Failed to create system directory nfs4 Jul 10 01:02:08.227000 audit[3099]: AVC avc: denied { confidentiality } for pid=3099 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 01:02:08.274426 kernel: Failed to create system directory nfs4 Jul 10 01:02:08.227000 audit[3099]: AVC avc: denied { confidentiality } for pid=3099 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 01:02:08.227000 audit[3099]: AVC avc: denied { confidentiality } for pid=3099 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 01:02:08.275612 kernel: Failed to create system directory nfs4 Jul 10 01:02:08.275641 kernel: Failed to create system directory nfs4 Jul 10 01:02:08.227000 audit[3099]: AVC avc: denied { confidentiality } for pid=3099 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 01:02:08.227000 audit[3099]: AVC avc: denied { confidentiality } for pid=3099 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 01:02:08.276790 kernel: Failed to create system directory nfs4 Jul 10 01:02:08.276821 kernel: Failed to create system directory nfs4 Jul 10 01:02:08.227000 audit[3099]: AVC avc: denied { confidentiality } for pid=3099 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 01:02:08.227000 audit[3099]: AVC avc: denied { confidentiality } for pid=3099 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 01:02:08.277987 kernel: Failed to create system directory nfs4 Jul 10 01:02:08.227000 audit[3099]: AVC avc: denied { confidentiality } for pid=3099 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 01:02:08.278610 kernel: Failed to create system directory nfs4 Jul 10 01:02:08.278645 kernel: Failed to create system directory nfs4 Jul 10 01:02:08.227000 audit[3099]: AVC avc: denied { confidentiality } for pid=3099 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 01:02:08.227000 audit[3099]: AVC avc: denied { confidentiality } for pid=3099 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 01:02:08.279879 kernel: Failed to create system directory nfs4 Jul 10 01:02:08.279907 kernel: Failed to create system directory nfs4 Jul 10 01:02:08.227000 audit[3099]: AVC avc: denied { confidentiality } for pid=3099 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 01:02:08.227000 audit[3099]: AVC avc: denied { confidentiality } for pid=3099 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 01:02:08.227000 audit[3099]: AVC avc: denied { confidentiality } for pid=3099 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 01:02:08.281686 kernel: Failed to create system directory nfs4 Jul 10 01:02:08.281720 kernel: Failed to create system directory nfs4 Jul 10 01:02:08.281735 kernel: Failed to create system directory nfs4 Jul 10 01:02:08.227000 audit[3099]: AVC avc: denied { confidentiality } for pid=3099 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 01:02:08.227000 audit[3099]: AVC avc: denied { confidentiality } for pid=3099 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 01:02:08.282867 kernel: Failed to create system directory nfs4 Jul 10 01:02:08.282894 kernel: Failed to create system directory nfs4 Jul 10 01:02:08.227000 audit[3099]: AVC avc: denied { confidentiality } for pid=3099 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 01:02:08.227000 audit[3099]: AVC avc: denied { confidentiality } for pid=3099 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 01:02:08.227000 audit[3099]: AVC avc: denied { confidentiality } for pid=3099 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 01:02:08.284675 kernel: Failed to create system directory nfs4 Jul 10 01:02:08.284700 kernel: Failed to create system directory nfs4 Jul 10 01:02:08.284716 kernel: Failed to create system directory nfs4 Jul 10 01:02:08.227000 audit[3099]: AVC avc: denied { confidentiality } for pid=3099 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 01:02:08.227000 audit[3099]: AVC avc: denied { confidentiality } for pid=3099 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 01:02:08.285863 kernel: Failed to create system directory nfs4 Jul 10 01:02:08.285893 kernel: Failed to create system directory nfs4 Jul 10 01:02:08.227000 audit[3099]: AVC avc: denied { confidentiality } for pid=3099 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 01:02:08.227000 audit[3099]: AVC avc: denied { confidentiality } for pid=3099 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 01:02:08.227000 audit[3099]: AVC avc: denied { confidentiality } for pid=3099 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 01:02:08.287645 kernel: Failed to create system directory nfs4 Jul 10 01:02:08.287674 kernel: Failed to create system directory nfs4 Jul 10 01:02:08.287690 kernel: Failed to create system directory nfs4 Jul 10 01:02:08.227000 audit[3099]: AVC avc: denied { confidentiality } for pid=3099 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 01:02:08.227000 audit[3099]: AVC avc: denied { confidentiality } for pid=3099 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 01:02:08.288841 kernel: Failed to create system directory nfs4 Jul 10 01:02:08.288869 kernel: Failed to create system directory nfs4 Jul 10 01:02:08.227000 audit[3099]: AVC avc: denied { confidentiality } for pid=3099 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 01:02:08.227000 audit[3099]: AVC avc: denied { confidentiality } for pid=3099 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 01:02:08.227000 audit[3099]: AVC avc: denied { confidentiality } for pid=3099 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 01:02:08.290643 kernel: Failed to create system directory nfs4 Jul 10 01:02:08.290674 kernel: Failed to create system directory nfs4 Jul 10 01:02:08.290691 kernel: Failed to create system directory nfs4 Jul 10 01:02:08.227000 audit[3099]: AVC avc: denied { confidentiality } for pid=3099 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 01:02:08.227000 audit[3099]: AVC avc: denied { confidentiality } for pid=3099 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 01:02:08.291848 kernel: Failed to create system directory nfs4 Jul 10 01:02:08.291885 kernel: Failed to create system directory nfs4 Jul 10 01:02:08.227000 audit[3099]: AVC avc: denied { confidentiality } for pid=3099 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 01:02:08.227000 audit[3099]: AVC avc: denied { confidentiality } for pid=3099 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 01:02:08.227000 audit[3099]: AVC avc: denied { confidentiality } for pid=3099 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 01:02:08.293800 kernel: Failed to create system directory nfs4 Jul 10 01:02:08.293832 kernel: Failed to create system directory nfs4 Jul 10 01:02:08.293847 kernel: Failed to create system directory nfs4 Jul 10 01:02:08.227000 audit[3099]: AVC avc: denied { confidentiality } for pid=3099 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 01:02:08.294434 kernel: Failed to create system directory nfs4 Jul 10 01:02:08.227000 audit[3099]: AVC avc: denied { confidentiality } for pid=3099 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 01:02:08.227000 audit[3099]: AVC avc: denied { confidentiality } for pid=3099 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 01:02:08.295596 kernel: Failed to create system directory nfs4 Jul 10 01:02:08.388456 kernel: NFS: Registering the id_resolver key type Jul 10 01:02:08.388526 kernel: Key type id_resolver registered Jul 10 01:02:08.388562 kernel: Key type id_legacy registered Jul 10 01:02:08.227000 audit[3099]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=7fb27eab3010 a1=20956c a2=55c6666352b0 a3=5 items=0 ppid=492 pid=3099 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 01:02:08.227000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D006E66737634 Jul 10 01:02:08.423000 audit[3100]: AVC avc: denied { confidentiality } for pid=3100 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 01:02:08.428896 kernel: Failed to create system directory rpcgss Jul 10 01:02:08.428938 kernel: Failed to create system directory rpcgss Jul 10 01:02:08.428953 kernel: Failed to create system directory rpcgss Jul 10 01:02:08.423000 audit[3100]: AVC avc: denied { confidentiality } for pid=3100 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 01:02:08.423000 audit[3100]: AVC avc: denied { confidentiality } for pid=3100 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 01:02:08.423000 audit[3100]: AVC avc: denied { confidentiality } for pid=3100 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 01:02:08.430714 kernel: Failed to create system directory rpcgss Jul 10 01:02:08.430739 kernel: Failed to create system directory rpcgss Jul 10 01:02:08.430753 kernel: Failed to create system directory rpcgss Jul 10 01:02:08.423000 audit[3100]: AVC avc: denied { confidentiality } for pid=3100 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 01:02:08.423000 audit[3100]: AVC avc: denied { confidentiality } for pid=3100 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 01:02:08.431961 kernel: Failed to create system directory rpcgss Jul 10 01:02:08.431986 kernel: Failed to create system directory rpcgss Jul 10 01:02:08.423000 audit[3100]: AVC avc: denied { confidentiality } for pid=3100 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 01:02:08.423000 audit[3100]: AVC avc: denied { confidentiality } for pid=3100 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 01:02:08.423000 audit[3100]: AVC avc: denied { confidentiality } for pid=3100 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 01:02:08.433833 kernel: Failed to create system directory rpcgss Jul 10 01:02:08.433856 kernel: Failed to create system directory rpcgss Jul 10 01:02:08.433871 kernel: Failed to create system directory rpcgss Jul 10 01:02:08.423000 audit[3100]: AVC avc: denied { confidentiality } for pid=3100 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 01:02:08.423000 audit[3100]: AVC avc: denied { confidentiality } for pid=3100 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 01:02:08.423000 audit[3100]: AVC avc: denied { confidentiality } for pid=3100 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 01:02:08.435431 kernel: Failed to create system directory rpcgss Jul 10 01:02:08.423000 audit[3100]: AVC avc: denied { confidentiality } for pid=3100 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 01:02:08.437808 kernel: Failed to create system directory rpcgss Jul 10 01:02:08.437855 kernel: Failed to create system directory rpcgss Jul 10 01:02:08.437884 kernel: Failed to create system directory rpcgss Jul 10 01:02:08.423000 audit[3100]: AVC avc: denied { confidentiality } for pid=3100 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 01:02:08.423000 audit[3100]: AVC avc: denied { confidentiality } for pid=3100 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 01:02:08.423000 audit[3100]: AVC avc: denied { confidentiality } for pid=3100 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 01:02:08.423000 audit[3100]: AVC avc: denied { confidentiality } for pid=3100 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 01:02:08.439742 kernel: Failed to create system directory rpcgss Jul 10 01:02:08.439790 kernel: Failed to create system directory rpcgss Jul 10 01:02:08.439808 kernel: Failed to create system directory rpcgss Jul 10 01:02:08.423000 audit[3100]: AVC avc: denied { confidentiality } for pid=3100 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 01:02:08.423000 audit[3100]: AVC avc: denied { confidentiality } for pid=3100 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 01:02:08.440982 kernel: Failed to create system directory rpcgss Jul 10 01:02:08.441017 kernel: Failed to create system directory rpcgss Jul 10 01:02:08.423000 audit[3100]: AVC avc: denied { confidentiality } for pid=3100 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 01:02:08.423000 audit[3100]: AVC avc: denied { confidentiality } for pid=3100 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 01:02:08.423000 audit[3100]: AVC avc: denied { confidentiality } for pid=3100 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 01:02:08.442861 kernel: Failed to create system directory rpcgss Jul 10 01:02:08.442906 kernel: Failed to create system directory rpcgss Jul 10 01:02:08.442931 kernel: Failed to create system directory rpcgss Jul 10 01:02:08.423000 audit[3100]: AVC avc: denied { confidentiality } for pid=3100 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 01:02:08.423000 audit[3100]: AVC avc: denied { confidentiality } for pid=3100 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 01:02:08.423000 audit[3100]: AVC avc: denied { confidentiality } for pid=3100 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 01:02:08.444794 kernel: Failed to create system directory rpcgss Jul 10 01:02:08.444820 kernel: Failed to create system directory rpcgss Jul 10 01:02:08.444843 kernel: Failed to create system directory rpcgss Jul 10 01:02:08.423000 audit[3100]: AVC avc: denied { confidentiality } for pid=3100 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 01:02:08.423000 audit[3100]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=7fbcdf4ba010 a1=70bac a2=560afdfa72b0 a3=5 items=0 ppid=492 pid=3100 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 01:02:08.423000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D007270632D617574682D36 Jul 10 01:02:08.473240 nfsidmap[3109]: nss_getpwnam: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain 'localdomain' Jul 10 01:02:08.474672 nfsidmap[3110]: nss_name_to_gid: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain 'localdomain' Jul 10 01:02:08.481000 audit[1380]: AVC avc: denied { watch_reads } for pid=1380 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2627 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Jul 10 01:02:08.481000 audit[1380]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=5639cda90d20 a2=10 a3=e28e614f0451e0dd items=0 ppid=1 pid=1380 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 01:02:08.481000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Jul 10 01:02:08.481000 audit[1380]: AVC avc: denied { watch_reads } for pid=1380 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2627 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Jul 10 01:02:08.481000 audit[1380]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=5639cda90d20 a2=10 a3=e28e614f0451e0dd items=0 ppid=1 pid=1380 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 01:02:08.481000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Jul 10 01:02:08.481000 audit[1380]: AVC avc: denied { watch_reads } for pid=1380 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2627 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Jul 10 01:02:08.481000 audit[1380]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=5639cda90d20 a2=10 a3=e28e614f0451e0dd items=0 ppid=1 pid=1380 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 01:02:08.481000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Jul 10 01:02:08.481000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2627 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Jul 10 01:02:08.481000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2627 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Jul 10 01:02:08.481000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2627 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Jul 10 01:02:08.582022 env[1286]: time="2025-07-10T01:02:08.581962473Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:b07bd5e6-c5d0-43f4-a9f7-819e0c1bdcf9,Namespace:default,Attempt:0,}" Jul 10 01:02:08.785349 systemd-networkd[1081]: cali5ec59c6bf6e: Link UP Jul 10 01:02:08.788090 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Jul 10 01:02:08.788159 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali5ec59c6bf6e: link becomes ready Jul 10 01:02:08.788901 systemd-networkd[1081]: cali5ec59c6bf6e: Gained carrier Jul 10 01:02:08.807617 env[1286]: 2025-07-10 01:02:08.685 [INFO][3111] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.67.124.135-k8s-test--pod--1-eth0 default b07bd5e6-c5d0-43f4-a9f7-819e0c1bdcf9 1665 0 2025-07-10 01:01:41 +0000 UTC map[projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 10.67.124.135 test-pod-1 eth0 default [] [] [kns.default ksa.default.default] cali5ec59c6bf6e [] [] }} ContainerID="8bca51fa4c3ae2a79166819405a26b4152dd24d56265b7097cf74211ad555a0b" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.67.124.135-k8s-test--pod--1-" Jul 10 01:02:08.807617 env[1286]: 2025-07-10 01:02:08.685 [INFO][3111] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="8bca51fa4c3ae2a79166819405a26b4152dd24d56265b7097cf74211ad555a0b" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.67.124.135-k8s-test--pod--1-eth0" Jul 10 01:02:08.807617 env[1286]: 2025-07-10 01:02:08.704 [INFO][3124] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="8bca51fa4c3ae2a79166819405a26b4152dd24d56265b7097cf74211ad555a0b" HandleID="k8s-pod-network.8bca51fa4c3ae2a79166819405a26b4152dd24d56265b7097cf74211ad555a0b" Workload="10.67.124.135-k8s-test--pod--1-eth0" Jul 10 01:02:08.807617 env[1286]: 2025-07-10 01:02:08.704 [INFO][3124] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="8bca51fa4c3ae2a79166819405a26b4152dd24d56265b7097cf74211ad555a0b" HandleID="k8s-pod-network.8bca51fa4c3ae2a79166819405a26b4152dd24d56265b7097cf74211ad555a0b" Workload="10.67.124.135-k8s-test--pod--1-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002d4ff0), Attrs:map[string]string{"namespace":"default", "node":"10.67.124.135", "pod":"test-pod-1", "timestamp":"2025-07-10 01:02:08.704718995 +0000 UTC"}, Hostname:"10.67.124.135", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Jul 10 01:02:08.807617 env[1286]: 2025-07-10 01:02:08.704 [INFO][3124] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Jul 10 01:02:08.807617 env[1286]: 2025-07-10 01:02:08.704 [INFO][3124] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Jul 10 01:02:08.807617 env[1286]: 2025-07-10 01:02:08.704 [INFO][3124] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.67.124.135' Jul 10 01:02:08.807617 env[1286]: 2025-07-10 01:02:08.746 [INFO][3124] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.8bca51fa4c3ae2a79166819405a26b4152dd24d56265b7097cf74211ad555a0b" host="10.67.124.135" Jul 10 01:02:08.807617 env[1286]: 2025-07-10 01:02:08.762 [INFO][3124] ipam/ipam.go 394: Looking up existing affinities for host host="10.67.124.135" Jul 10 01:02:08.807617 env[1286]: 2025-07-10 01:02:08.764 [INFO][3124] ipam/ipam.go 511: Trying affinity for 192.168.53.128/26 host="10.67.124.135" Jul 10 01:02:08.807617 env[1286]: 2025-07-10 01:02:08.765 [INFO][3124] ipam/ipam.go 158: Attempting to load block cidr=192.168.53.128/26 host="10.67.124.135" Jul 10 01:02:08.807617 env[1286]: 2025-07-10 01:02:08.766 [INFO][3124] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.53.128/26 host="10.67.124.135" Jul 10 01:02:08.807617 env[1286]: 2025-07-10 01:02:08.766 [INFO][3124] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.53.128/26 handle="k8s-pod-network.8bca51fa4c3ae2a79166819405a26b4152dd24d56265b7097cf74211ad555a0b" host="10.67.124.135" Jul 10 01:02:08.807617 env[1286]: 2025-07-10 01:02:08.768 [INFO][3124] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.8bca51fa4c3ae2a79166819405a26b4152dd24d56265b7097cf74211ad555a0b Jul 10 01:02:08.807617 env[1286]: 2025-07-10 01:02:08.776 [INFO][3124] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.53.128/26 handle="k8s-pod-network.8bca51fa4c3ae2a79166819405a26b4152dd24d56265b7097cf74211ad555a0b" host="10.67.124.135" Jul 10 01:02:08.807617 env[1286]: 2025-07-10 01:02:08.781 [INFO][3124] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.53.132/26] block=192.168.53.128/26 handle="k8s-pod-network.8bca51fa4c3ae2a79166819405a26b4152dd24d56265b7097cf74211ad555a0b" host="10.67.124.135" Jul 10 01:02:08.807617 env[1286]: 2025-07-10 01:02:08.781 [INFO][3124] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.53.132/26] handle="k8s-pod-network.8bca51fa4c3ae2a79166819405a26b4152dd24d56265b7097cf74211ad555a0b" host="10.67.124.135" Jul 10 01:02:08.807617 env[1286]: 2025-07-10 01:02:08.781 [INFO][3124] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Jul 10 01:02:08.807617 env[1286]: 2025-07-10 01:02:08.781 [INFO][3124] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.53.132/26] IPv6=[] ContainerID="8bca51fa4c3ae2a79166819405a26b4152dd24d56265b7097cf74211ad555a0b" HandleID="k8s-pod-network.8bca51fa4c3ae2a79166819405a26b4152dd24d56265b7097cf74211ad555a0b" Workload="10.67.124.135-k8s-test--pod--1-eth0" Jul 10 01:02:08.807617 env[1286]: 2025-07-10 01:02:08.782 [INFO][3111] cni-plugin/k8s.go 418: Populated endpoint ContainerID="8bca51fa4c3ae2a79166819405a26b4152dd24d56265b7097cf74211ad555a0b" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.67.124.135-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.67.124.135-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"b07bd5e6-c5d0-43f4-a9f7-819e0c1bdcf9", ResourceVersion:"1665", Generation:0, CreationTimestamp:time.Date(2025, time.July, 10, 1, 1, 41, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.67.124.135", ContainerID:"", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.53.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Jul 10 01:02:08.808270 env[1286]: 2025-07-10 01:02:08.782 [INFO][3111] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.53.132/32] ContainerID="8bca51fa4c3ae2a79166819405a26b4152dd24d56265b7097cf74211ad555a0b" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.67.124.135-k8s-test--pod--1-eth0" Jul 10 01:02:08.808270 env[1286]: 2025-07-10 01:02:08.782 [INFO][3111] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali5ec59c6bf6e ContainerID="8bca51fa4c3ae2a79166819405a26b4152dd24d56265b7097cf74211ad555a0b" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.67.124.135-k8s-test--pod--1-eth0" Jul 10 01:02:08.808270 env[1286]: 2025-07-10 01:02:08.789 [INFO][3111] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="8bca51fa4c3ae2a79166819405a26b4152dd24d56265b7097cf74211ad555a0b" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.67.124.135-k8s-test--pod--1-eth0" Jul 10 01:02:08.808270 env[1286]: 2025-07-10 01:02:08.790 [INFO][3111] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="8bca51fa4c3ae2a79166819405a26b4152dd24d56265b7097cf74211ad555a0b" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.67.124.135-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.67.124.135-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"b07bd5e6-c5d0-43f4-a9f7-819e0c1bdcf9", ResourceVersion:"1665", Generation:0, CreationTimestamp:time.Date(2025, time.July, 10, 1, 1, 41, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.67.124.135", ContainerID:"8bca51fa4c3ae2a79166819405a26b4152dd24d56265b7097cf74211ad555a0b", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.53.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"1e:36:08:4c:2e:56", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Jul 10 01:02:08.808270 env[1286]: 2025-07-10 01:02:08.806 [INFO][3111] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="8bca51fa4c3ae2a79166819405a26b4152dd24d56265b7097cf74211ad555a0b" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.67.124.135-k8s-test--pod--1-eth0" Jul 10 01:02:08.815508 env[1286]: time="2025-07-10T01:02:08.815402302Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 10 01:02:08.815682 env[1286]: time="2025-07-10T01:02:08.815472152Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 10 01:02:08.815682 env[1286]: time="2025-07-10T01:02:08.815484285Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 10 01:02:08.815768 env[1286]: time="2025-07-10T01:02:08.815712216Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/8bca51fa4c3ae2a79166819405a26b4152dd24d56265b7097cf74211ad555a0b pid=3145 runtime=io.containerd.runc.v2 Jul 10 01:02:08.824545 systemd[1]: Started cri-containerd-8bca51fa4c3ae2a79166819405a26b4152dd24d56265b7097cf74211ad555a0b.scope. Jul 10 01:02:08.831000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:02:08.831000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:02:08.831000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:02:08.831000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:02:08.831000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:02:08.831000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:02:08.831000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:02:08.831000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:02:08.831000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:02:08.831000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:02:08.831000 audit: BPF prog-id=126 op=LOAD Jul 10 01:02:08.832000 audit[3156]: AVC avc: denied { bpf } for pid=3156 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:02:08.832000 audit[3156]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3145 pid=3156 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 01:02:08.832000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3862636135316661346333616532613739313636383139343035613236 Jul 10 01:02:08.832000 audit[3156]: AVC avc: denied { perfmon } for pid=3156 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:02:08.832000 audit[3156]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=3145 pid=3156 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 01:02:08.832000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3862636135316661346333616532613739313636383139343035613236 Jul 10 01:02:08.832000 audit[3156]: AVC avc: denied { bpf } for pid=3156 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:02:08.832000 audit[3156]: AVC avc: denied { bpf } for pid=3156 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:02:08.832000 audit[3156]: AVC avc: denied { bpf } for pid=3156 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:02:08.832000 audit[3156]: AVC avc: denied { perfmon } for pid=3156 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:02:08.832000 audit[3156]: AVC avc: denied { perfmon } for pid=3156 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:02:08.832000 audit[3156]: AVC avc: denied { perfmon } for pid=3156 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:02:08.832000 audit[3156]: AVC avc: denied { perfmon } for pid=3156 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:02:08.832000 audit[3156]: AVC avc: denied { perfmon } for pid=3156 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:02:08.832000 audit[3156]: AVC avc: denied { bpf } for pid=3156 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:02:08.832000 audit[3156]: AVC avc: denied { bpf } for pid=3156 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:02:08.832000 audit: BPF prog-id=127 op=LOAD Jul 10 01:02:08.832000 audit[3156]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c00036e710 items=0 ppid=3145 pid=3156 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 01:02:08.832000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3862636135316661346333616532613739313636383139343035613236 Jul 10 01:02:08.833000 audit[3156]: AVC avc: denied { bpf } for pid=3156 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:02:08.833000 audit[3156]: AVC avc: denied { bpf } for pid=3156 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:02:08.833000 audit[3156]: AVC avc: denied { perfmon } for pid=3156 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:02:08.833000 audit[3156]: AVC avc: denied { perfmon } for pid=3156 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:02:08.833000 audit[3156]: AVC avc: denied { perfmon } for pid=3156 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:02:08.833000 audit[3156]: AVC avc: denied { perfmon } for pid=3156 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:02:08.833000 audit[3156]: AVC avc: denied { perfmon } for pid=3156 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:02:08.833000 audit[3156]: AVC avc: denied { bpf } for pid=3156 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:02:08.833000 audit[3156]: AVC avc: denied { bpf } for pid=3156 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:02:08.833000 audit: BPF prog-id=128 op=LOAD Jul 10 01:02:08.833000 audit[3156]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c00036e758 items=0 ppid=3145 pid=3156 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 01:02:08.833000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3862636135316661346333616532613739313636383139343035613236 Jul 10 01:02:08.833000 audit: BPF prog-id=128 op=UNLOAD Jul 10 01:02:08.833000 audit: BPF prog-id=127 op=UNLOAD Jul 10 01:02:08.833000 audit[3156]: AVC avc: denied { bpf } for pid=3156 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:02:08.833000 audit[3156]: AVC avc: denied { bpf } for pid=3156 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:02:08.833000 audit[3156]: AVC avc: denied { bpf } for pid=3156 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:02:08.833000 audit[3156]: AVC avc: denied { perfmon } for pid=3156 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:02:08.833000 audit[3156]: AVC avc: denied { perfmon } for pid=3156 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:02:08.833000 audit[3156]: AVC avc: denied { perfmon } for pid=3156 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:02:08.833000 audit[3156]: AVC avc: denied { perfmon } for pid=3156 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:02:08.833000 audit[3156]: AVC avc: denied { perfmon } for pid=3156 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:02:08.833000 audit[3156]: AVC avc: denied { bpf } for pid=3156 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:02:08.833000 audit[3156]: AVC avc: denied { bpf } for pid=3156 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:02:08.833000 audit: BPF prog-id=129 op=LOAD Jul 10 01:02:08.833000 audit[3156]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c00036eb68 items=0 ppid=3145 pid=3156 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 01:02:08.833000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3862636135316661346333616532613739313636383139343035613236 Jul 10 01:02:08.836162 systemd-resolved[1222]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Jul 10 01:02:08.854808 env[1286]: time="2025-07-10T01:02:08.854781625Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:b07bd5e6-c5d0-43f4-a9f7-819e0c1bdcf9,Namespace:default,Attempt:0,} returns sandbox id \"8bca51fa4c3ae2a79166819405a26b4152dd24d56265b7097cf74211ad555a0b\"" Jul 10 01:02:08.855726 env[1286]: time="2025-07-10T01:02:08.855633428Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" Jul 10 01:02:08.941000 audit[3181]: NETFILTER_CFG table=filter:82 family=2 entries=40 op=nft_register_chain pid=3181 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 10 01:02:08.941000 audit[3181]: SYSCALL arch=c000003e syscall=46 success=yes exit=20336 a0=3 a1=7ffd01f572b0 a2=0 a3=7ffd01f5729c items=0 ppid=2255 pid=3181 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 01:02:08.941000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 10 01:02:09.169228 kubelet[1620]: E0710 01:02:09.169186 1620 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 01:02:09.324018 env[1286]: time="2025-07-10T01:02:09.323975046Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 10 01:02:09.326095 env[1286]: time="2025-07-10T01:02:09.326061314Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:f6422896ca84c9af48d5417d6b7a573bf6b38f81edc15538907d987fc658d909,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 10 01:02:09.327250 env[1286]: time="2025-07-10T01:02:09.327225495Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 10 01:02:09.329069 env[1286]: time="2025-07-10T01:02:09.329041516Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx@sha256:30bb68e656e0665bce700e67d2756f68bdca3345fa1099a32bfdb8febcf621cd,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 10 01:02:09.329757 env[1286]: time="2025-07-10T01:02:09.329732366Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:f6422896ca84c9af48d5417d6b7a573bf6b38f81edc15538907d987fc658d909\"" Jul 10 01:02:09.331756 env[1286]: time="2025-07-10T01:02:09.331734489Z" level=info msg="CreateContainer within sandbox \"8bca51fa4c3ae2a79166819405a26b4152dd24d56265b7097cf74211ad555a0b\" for container &ContainerMetadata{Name:test,Attempt:0,}" Jul 10 01:02:09.339389 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount484060804.mount: Deactivated successfully. Jul 10 01:02:09.344289 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3361547778.mount: Deactivated successfully. Jul 10 01:02:09.350841 env[1286]: time="2025-07-10T01:02:09.350790468Z" level=info msg="CreateContainer within sandbox \"8bca51fa4c3ae2a79166819405a26b4152dd24d56265b7097cf74211ad555a0b\" for &ContainerMetadata{Name:test,Attempt:0,} returns container id \"77987a13d7160502802e957996cdb7b3090b3b6669ffabe795d40c19d2e93323\"" Jul 10 01:02:09.351309 env[1286]: time="2025-07-10T01:02:09.351296514Z" level=info msg="StartContainer for \"77987a13d7160502802e957996cdb7b3090b3b6669ffabe795d40c19d2e93323\"" Jul 10 01:02:09.363075 systemd[1]: Started cri-containerd-77987a13d7160502802e957996cdb7b3090b3b6669ffabe795d40c19d2e93323.scope. Jul 10 01:02:09.375000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:02:09.375000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:02:09.375000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:02:09.375000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:02:09.375000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:02:09.375000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:02:09.375000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:02:09.375000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:02:09.375000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:02:09.375000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:02:09.375000 audit: BPF prog-id=130 op=LOAD Jul 10 01:02:09.376000 audit[3191]: AVC avc: denied { bpf } for pid=3191 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:02:09.376000 audit[3191]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000149c48 a2=10 a3=1c items=0 ppid=3145 pid=3191 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 01:02:09.376000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3737393837613133643731363035303238303265393537393936636462 Jul 10 01:02:09.376000 audit[3191]: AVC avc: denied { perfmon } for pid=3191 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:02:09.376000 audit[3191]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001496b0 a2=3c a3=8 items=0 ppid=3145 pid=3191 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 01:02:09.376000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3737393837613133643731363035303238303265393537393936636462 Jul 10 01:02:09.376000 audit[3191]: AVC avc: denied { bpf } for pid=3191 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:02:09.376000 audit[3191]: AVC avc: denied { bpf } for pid=3191 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:02:09.376000 audit[3191]: AVC avc: denied { bpf } for pid=3191 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:02:09.376000 audit[3191]: AVC avc: denied { perfmon } for pid=3191 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:02:09.376000 audit[3191]: AVC avc: denied { perfmon } for pid=3191 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:02:09.376000 audit[3191]: AVC avc: denied { perfmon } for pid=3191 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:02:09.376000 audit[3191]: AVC avc: denied { perfmon } for pid=3191 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:02:09.376000 audit[3191]: AVC avc: denied { perfmon } for pid=3191 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:02:09.376000 audit[3191]: AVC avc: denied { bpf } for pid=3191 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:02:09.376000 audit[3191]: AVC avc: denied { bpf } for pid=3191 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:02:09.376000 audit: BPF prog-id=131 op=LOAD Jul 10 01:02:09.376000 audit[3191]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001499d8 a2=78 a3=c00020b700 items=0 ppid=3145 pid=3191 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 01:02:09.376000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3737393837613133643731363035303238303265393537393936636462 Jul 10 01:02:09.376000 audit[3191]: AVC avc: denied { bpf } for pid=3191 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:02:09.376000 audit[3191]: AVC avc: denied { bpf } for pid=3191 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:02:09.376000 audit[3191]: AVC avc: denied { perfmon } for pid=3191 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:02:09.376000 audit[3191]: AVC avc: denied { perfmon } for pid=3191 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:02:09.376000 audit[3191]: AVC avc: denied { perfmon } for pid=3191 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:02:09.376000 audit[3191]: AVC avc: denied { perfmon } for pid=3191 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:02:09.376000 audit[3191]: AVC avc: denied { perfmon } for pid=3191 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:02:09.376000 audit[3191]: AVC avc: denied { bpf } for pid=3191 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:02:09.376000 audit[3191]: AVC avc: denied { bpf } for pid=3191 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:02:09.376000 audit: BPF prog-id=132 op=LOAD Jul 10 01:02:09.376000 audit[3191]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000149770 a2=78 a3=c00020b748 items=0 ppid=3145 pid=3191 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 01:02:09.376000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3737393837613133643731363035303238303265393537393936636462 Jul 10 01:02:09.376000 audit: BPF prog-id=132 op=UNLOAD Jul 10 01:02:09.376000 audit: BPF prog-id=131 op=UNLOAD Jul 10 01:02:09.376000 audit[3191]: AVC avc: denied { bpf } for pid=3191 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:02:09.376000 audit[3191]: AVC avc: denied { bpf } for pid=3191 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:02:09.376000 audit[3191]: AVC avc: denied { bpf } for pid=3191 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:02:09.376000 audit[3191]: AVC avc: denied { perfmon } for pid=3191 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:02:09.376000 audit[3191]: AVC avc: denied { perfmon } for pid=3191 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:02:09.376000 audit[3191]: AVC avc: denied { perfmon } for pid=3191 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:02:09.376000 audit[3191]: AVC avc: denied { perfmon } for pid=3191 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:02:09.376000 audit[3191]: AVC avc: denied { perfmon } for pid=3191 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:02:09.376000 audit[3191]: AVC avc: denied { bpf } for pid=3191 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:02:09.376000 audit[3191]: AVC avc: denied { bpf } for pid=3191 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:02:09.376000 audit: BPF prog-id=133 op=LOAD Jul 10 01:02:09.376000 audit[3191]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000149c30 a2=78 a3=c00020bb58 items=0 ppid=3145 pid=3191 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 01:02:09.376000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3737393837613133643731363035303238303265393537393936636462 Jul 10 01:02:09.404219 env[1286]: time="2025-07-10T01:02:09.404189994Z" level=info msg="StartContainer for \"77987a13d7160502802e957996cdb7b3090b3b6669ffabe795d40c19d2e93323\" returns successfully" Jul 10 01:02:10.170257 kubelet[1620]: E0710 01:02:10.170232 1620 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 01:02:10.456660 systemd-networkd[1081]: cali5ec59c6bf6e: Gained IPv6LL Jul 10 01:02:11.170792 kubelet[1620]: E0710 01:02:11.170766 1620 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 01:02:12.171303 kubelet[1620]: E0710 01:02:12.171279 1620 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 01:02:13.172128 kubelet[1620]: E0710 01:02:13.172100 1620 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 01:02:14.172468 kubelet[1620]: E0710 01:02:14.172436 1620 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 01:02:15.173377 kubelet[1620]: E0710 01:02:15.173326 1620 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 01:02:16.174231 kubelet[1620]: E0710 01:02:16.174211 1620 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 01:02:17.174568 kubelet[1620]: E0710 01:02:17.174532 1620 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 01:02:18.174924 kubelet[1620]: E0710 01:02:18.174890 1620 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 01:02:19.175301 kubelet[1620]: E0710 01:02:19.175280 1620 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 01:02:20.176339 kubelet[1620]: E0710 01:02:20.176306 1620 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 01:02:21.052442 kubelet[1620]: E0710 01:02:21.052396 1620 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 01:02:21.177029 kubelet[1620]: E0710 01:02:21.176990 1620 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 01:02:22.177220 kubelet[1620]: E0710 01:02:22.177197 1620 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 01:02:23.178158 kubelet[1620]: E0710 01:02:23.178132 1620 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 01:02:24.178971 kubelet[1620]: E0710 01:02:24.178946 1620 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 01:02:25.179636 kubelet[1620]: E0710 01:02:25.179616 1620 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 01:02:26.180517 kubelet[1620]: E0710 01:02:26.180490 1620 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 01:02:27.181530 kubelet[1620]: E0710 01:02:27.181505 1620 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 01:02:28.182081 kubelet[1620]: E0710 01:02:28.182053 1620 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 01:02:29.182527 kubelet[1620]: E0710 01:02:29.182496 1620 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 01:02:30.182609 kubelet[1620]: E0710 01:02:30.182578 1620 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 01:02:30.215246 systemd[1]: run-containerd-runc-k8s.io-4627b58e82075f31fee1a01ca11701b9cec5ea1b58922d10114e451441294b1d-runc.mM83EQ.mount: Deactivated successfully. Jul 10 01:02:31.182699 kubelet[1620]: E0710 01:02:31.182663 1620 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 01:02:32.183212 kubelet[1620]: E0710 01:02:32.183176 1620 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 01:02:33.183872 kubelet[1620]: E0710 01:02:33.183828 1620 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 01:02:34.184766 kubelet[1620]: E0710 01:02:34.184734 1620 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 01:02:35.184946 kubelet[1620]: E0710 01:02:35.184914 1620 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"