Jul 10 00:22:58.732841 kernel: Booting Linux on physical CPU 0x0000000000 [0x413fd0c1] Jul 10 00:22:58.732861 kernel: Linux version 5.15.186-flatcar (build@pony-truck.infra.kinvolk.io) (aarch64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP PREEMPT Wed Jul 9 23:19:15 -00 2025 Jul 10 00:22:58.732869 kernel: efi: EFI v2.70 by EDK II Jul 10 00:22:58.732875 kernel: efi: SMBIOS 3.0=0xd9260000 ACPI 2.0=0xd9240000 MEMATTR=0xda32b018 RNG=0xd9220018 MEMRESERVE=0xd9521c18 Jul 10 00:22:58.732880 kernel: random: crng init done Jul 10 00:22:58.732886 kernel: ACPI: Early table checksum verification disabled Jul 10 00:22:58.732892 kernel: ACPI: RSDP 0x00000000D9240000 000024 (v02 BOCHS ) Jul 10 00:22:58.732901 kernel: ACPI: XSDT 0x00000000D9230000 000064 (v01 BOCHS BXPC 00000001 01000013) Jul 10 00:22:58.732906 kernel: ACPI: FACP 0x00000000D91E0000 000114 (v06 BOCHS BXPC 00000001 BXPC 00000001) Jul 10 00:22:58.732912 kernel: ACPI: DSDT 0x00000000D91F0000 0014A2 (v02 BOCHS BXPC 00000001 BXPC 00000001) Jul 10 00:22:58.732917 kernel: ACPI: APIC 0x00000000D91D0000 0001A8 (v04 BOCHS BXPC 00000001 BXPC 00000001) Jul 10 00:22:58.732922 kernel: ACPI: PPTT 0x00000000D91C0000 00009C (v02 BOCHS BXPC 00000001 BXPC 00000001) Jul 10 00:22:58.732928 kernel: ACPI: GTDT 0x00000000D91B0000 000060 (v02 BOCHS BXPC 00000001 BXPC 00000001) Jul 10 00:22:58.732933 kernel: ACPI: MCFG 0x00000000D91A0000 00003C (v01 BOCHS BXPC 00000001 BXPC 00000001) Jul 10 00:22:58.732941 kernel: ACPI: SPCR 0x00000000D9190000 000050 (v02 BOCHS BXPC 00000001 BXPC 00000001) Jul 10 00:22:58.732947 kernel: ACPI: DBG2 0x00000000D9180000 000057 (v00 BOCHS BXPC 00000001 BXPC 00000001) Jul 10 00:22:58.732953 kernel: ACPI: IORT 0x00000000D9170000 000080 (v03 BOCHS BXPC 00000001 BXPC 00000001) Jul 10 00:22:58.732958 kernel: ACPI: SPCR: console: pl011,mmio,0x9000000,9600 Jul 10 00:22:58.732964 kernel: NUMA: Failed to initialise from firmware Jul 10 00:22:58.732970 kernel: NUMA: Faking a node at [mem 0x0000000040000000-0x00000000dcffffff] Jul 10 00:22:58.732976 kernel: NUMA: NODE_DATA [mem 0xdcb0b900-0xdcb10fff] Jul 10 00:22:58.732981 kernel: Zone ranges: Jul 10 00:22:58.732987 kernel: DMA [mem 0x0000000040000000-0x00000000dcffffff] Jul 10 00:22:58.732993 kernel: DMA32 empty Jul 10 00:22:58.732999 kernel: Normal empty Jul 10 00:22:58.733004 kernel: Movable zone start for each node Jul 10 00:22:58.733010 kernel: Early memory node ranges Jul 10 00:22:58.733016 kernel: node 0: [mem 0x0000000040000000-0x00000000d924ffff] Jul 10 00:22:58.733021 kernel: node 0: [mem 0x00000000d9250000-0x00000000d951ffff] Jul 10 00:22:58.733027 kernel: node 0: [mem 0x00000000d9520000-0x00000000dc7fffff] Jul 10 00:22:58.733033 kernel: node 0: [mem 0x00000000dc800000-0x00000000dc88ffff] Jul 10 00:22:58.733038 kernel: node 0: [mem 0x00000000dc890000-0x00000000dc89ffff] Jul 10 00:22:58.733044 kernel: node 0: [mem 0x00000000dc8a0000-0x00000000dc9bffff] Jul 10 00:22:58.733050 kernel: node 0: [mem 0x00000000dc9c0000-0x00000000dcffffff] Jul 10 00:22:58.733055 kernel: Initmem setup node 0 [mem 0x0000000040000000-0x00000000dcffffff] Jul 10 00:22:58.733062 kernel: On node 0, zone DMA: 12288 pages in unavailable ranges Jul 10 00:22:58.733068 kernel: psci: probing for conduit method from ACPI. Jul 10 00:22:58.733073 kernel: psci: PSCIv1.1 detected in firmware. Jul 10 00:22:58.733079 kernel: psci: Using standard PSCI v0.2 function IDs Jul 10 00:22:58.733085 kernel: psci: Trusted OS migration not required Jul 10 00:22:58.733093 kernel: psci: SMC Calling Convention v1.1 Jul 10 00:22:58.733099 kernel: smccc: KVM: hypervisor services detected (0x00000000 0x00000000 0x00000000 0x00000003) Jul 10 00:22:58.733106 kernel: ACPI: SRAT not present Jul 10 00:22:58.733112 kernel: percpu: Embedded 30 pages/cpu s82968 r8192 d31720 u122880 Jul 10 00:22:58.733118 kernel: pcpu-alloc: s82968 r8192 d31720 u122880 alloc=30*4096 Jul 10 00:22:58.733124 kernel: pcpu-alloc: [0] 0 [0] 1 [0] 2 [0] 3 Jul 10 00:22:58.733130 kernel: Detected PIPT I-cache on CPU0 Jul 10 00:22:58.733137 kernel: CPU features: detected: GIC system register CPU interface Jul 10 00:22:58.733143 kernel: CPU features: detected: Hardware dirty bit management Jul 10 00:22:58.733149 kernel: CPU features: detected: Spectre-v4 Jul 10 00:22:58.733155 kernel: CPU features: detected: Spectre-BHB Jul 10 00:22:58.733162 kernel: CPU features: kernel page table isolation forced ON by KASLR Jul 10 00:22:58.733168 kernel: CPU features: detected: Kernel page table isolation (KPTI) Jul 10 00:22:58.733174 kernel: CPU features: detected: ARM erratum 1418040 Jul 10 00:22:58.733180 kernel: CPU features: detected: SSBS not fully self-synchronizing Jul 10 00:22:58.733186 kernel: Built 1 zonelists, mobility grouping on. Total pages: 633024 Jul 10 00:22:58.733192 kernel: Policy zone: DMA Jul 10 00:22:58.733199 kernel: Kernel command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected acpi=force verity.usrhash=97626bbec4e8c603c151f40dbbae5fabba3cda417023e06335ea30183b36a27f Jul 10 00:22:58.733206 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Jul 10 00:22:58.733212 kernel: Dentry cache hash table entries: 524288 (order: 10, 4194304 bytes, linear) Jul 10 00:22:58.733218 kernel: Inode-cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) Jul 10 00:22:58.733224 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Jul 10 00:22:58.733232 kernel: Memory: 2457340K/2572288K available (9792K kernel code, 2094K rwdata, 7588K rodata, 36416K init, 777K bss, 114948K reserved, 0K cma-reserved) Jul 10 00:22:58.733238 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=4, Nodes=1 Jul 10 00:22:58.733244 kernel: trace event string verifier disabled Jul 10 00:22:58.733250 kernel: rcu: Preemptible hierarchical RCU implementation. Jul 10 00:22:58.733257 kernel: rcu: RCU event tracing is enabled. Jul 10 00:22:58.733263 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=4. Jul 10 00:22:58.733270 kernel: Trampoline variant of Tasks RCU enabled. Jul 10 00:22:58.733276 kernel: Tracing variant of Tasks RCU enabled. Jul 10 00:22:58.733282 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Jul 10 00:22:58.733288 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=4 Jul 10 00:22:58.733294 kernel: NR_IRQS: 64, nr_irqs: 64, preallocated irqs: 0 Jul 10 00:22:58.733301 kernel: GICv3: 256 SPIs implemented Jul 10 00:22:58.733307 kernel: GICv3: 0 Extended SPIs implemented Jul 10 00:22:58.733313 kernel: GICv3: Distributor has no Range Selector support Jul 10 00:22:58.733319 kernel: Root IRQ handler: gic_handle_irq Jul 10 00:22:58.733325 kernel: GICv3: 16 PPIs implemented Jul 10 00:22:58.733331 kernel: GICv3: CPU0: found redistributor 0 region 0:0x00000000080a0000 Jul 10 00:22:58.733337 kernel: ACPI: SRAT not present Jul 10 00:22:58.733343 kernel: ITS [mem 0x08080000-0x0809ffff] Jul 10 00:22:58.733349 kernel: ITS@0x0000000008080000: allocated 8192 Devices @400b0000 (indirect, esz 8, psz 64K, shr 1) Jul 10 00:22:58.733356 kernel: ITS@0x0000000008080000: allocated 8192 Interrupt Collections @400c0000 (flat, esz 8, psz 64K, shr 1) Jul 10 00:22:58.733362 kernel: GICv3: using LPI property table @0x00000000400d0000 Jul 10 00:22:58.733368 kernel: GICv3: CPU0: using allocated LPI pending table @0x00000000400e0000 Jul 10 00:22:58.733375 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Jul 10 00:22:58.733382 kernel: arch_timer: cp15 timer(s) running at 25.00MHz (virt). Jul 10 00:22:58.733404 kernel: clocksource: arch_sys_counter: mask: 0xffffffffffffff max_cycles: 0x5c40939b5, max_idle_ns: 440795202646 ns Jul 10 00:22:58.733410 kernel: sched_clock: 56 bits at 25MHz, resolution 40ns, wraps every 4398046511100ns Jul 10 00:22:58.733416 kernel: arm-pv: using stolen time PV Jul 10 00:22:58.733423 kernel: Console: colour dummy device 80x25 Jul 10 00:22:58.733429 kernel: ACPI: Core revision 20210730 Jul 10 00:22:58.733436 kernel: Calibrating delay loop (skipped), value calculated using timer frequency.. 50.00 BogoMIPS (lpj=25000) Jul 10 00:22:58.733442 kernel: pid_max: default: 32768 minimum: 301 Jul 10 00:22:58.733448 kernel: LSM: Security Framework initializing Jul 10 00:22:58.733456 kernel: SELinux: Initializing. Jul 10 00:22:58.733462 kernel: Mount-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) Jul 10 00:22:58.733469 kernel: Mountpoint-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) Jul 10 00:22:58.733475 kernel: rcu: Hierarchical SRCU implementation. Jul 10 00:22:58.733481 kernel: Platform MSI: ITS@0x8080000 domain created Jul 10 00:22:58.733487 kernel: PCI/MSI: ITS@0x8080000 domain created Jul 10 00:22:58.733493 kernel: Remapping and enabling EFI services. Jul 10 00:22:58.733499 kernel: smp: Bringing up secondary CPUs ... Jul 10 00:22:58.733506 kernel: Detected PIPT I-cache on CPU1 Jul 10 00:22:58.733513 kernel: GICv3: CPU1: found redistributor 1 region 0:0x00000000080c0000 Jul 10 00:22:58.733519 kernel: GICv3: CPU1: using allocated LPI pending table @0x00000000400f0000 Jul 10 00:22:58.733525 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Jul 10 00:22:58.733532 kernel: CPU1: Booted secondary processor 0x0000000001 [0x413fd0c1] Jul 10 00:22:58.733538 kernel: Detected PIPT I-cache on CPU2 Jul 10 00:22:58.733544 kernel: GICv3: CPU2: found redistributor 2 region 0:0x00000000080e0000 Jul 10 00:22:58.733551 kernel: GICv3: CPU2: using allocated LPI pending table @0x0000000040100000 Jul 10 00:22:58.733970 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Jul 10 00:22:58.733988 kernel: CPU2: Booted secondary processor 0x0000000002 [0x413fd0c1] Jul 10 00:22:58.733995 kernel: Detected PIPT I-cache on CPU3 Jul 10 00:22:58.734005 kernel: GICv3: CPU3: found redistributor 3 region 0:0x0000000008100000 Jul 10 00:22:58.734011 kernel: GICv3: CPU3: using allocated LPI pending table @0x0000000040110000 Jul 10 00:22:58.734018 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Jul 10 00:22:58.734024 kernel: CPU3: Booted secondary processor 0x0000000003 [0x413fd0c1] Jul 10 00:22:58.734035 kernel: smp: Brought up 1 node, 4 CPUs Jul 10 00:22:58.734043 kernel: SMP: Total of 4 processors activated. Jul 10 00:22:58.734050 kernel: CPU features: detected: 32-bit EL0 Support Jul 10 00:22:58.734057 kernel: CPU features: detected: Data cache clean to the PoU not required for I/D coherence Jul 10 00:22:58.734063 kernel: CPU features: detected: Common not Private translations Jul 10 00:22:58.734070 kernel: CPU features: detected: CRC32 instructions Jul 10 00:22:58.734077 kernel: CPU features: detected: RCpc load-acquire (LDAPR) Jul 10 00:22:58.734083 kernel: CPU features: detected: LSE atomic instructions Jul 10 00:22:58.734091 kernel: CPU features: detected: Privileged Access Never Jul 10 00:22:58.734098 kernel: CPU features: detected: RAS Extension Support Jul 10 00:22:58.734105 kernel: CPU features: detected: Speculative Store Bypassing Safe (SSBS) Jul 10 00:22:58.734112 kernel: CPU: All CPU(s) started at EL1 Jul 10 00:22:58.734118 kernel: alternatives: patching kernel code Jul 10 00:22:58.734126 kernel: devtmpfs: initialized Jul 10 00:22:58.734133 kernel: KASLR enabled Jul 10 00:22:58.734140 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Jul 10 00:22:58.734147 kernel: futex hash table entries: 1024 (order: 4, 65536 bytes, linear) Jul 10 00:22:58.734153 kernel: pinctrl core: initialized pinctrl subsystem Jul 10 00:22:58.734160 kernel: SMBIOS 3.0.0 present. Jul 10 00:22:58.734166 kernel: DMI: QEMU KVM Virtual Machine, BIOS 0.0.0 02/06/2015 Jul 10 00:22:58.734173 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Jul 10 00:22:58.734180 kernel: DMA: preallocated 512 KiB GFP_KERNEL pool for atomic allocations Jul 10 00:22:58.734188 kernel: DMA: preallocated 512 KiB GFP_KERNEL|GFP_DMA pool for atomic allocations Jul 10 00:22:58.734195 kernel: DMA: preallocated 512 KiB GFP_KERNEL|GFP_DMA32 pool for atomic allocations Jul 10 00:22:58.734201 kernel: audit: initializing netlink subsys (disabled) Jul 10 00:22:58.734208 kernel: audit: type=2000 audit(0.039:1): state=initialized audit_enabled=0 res=1 Jul 10 00:22:58.734215 kernel: thermal_sys: Registered thermal governor 'step_wise' Jul 10 00:22:58.734222 kernel: cpuidle: using governor menu Jul 10 00:22:58.734228 kernel: hw-breakpoint: found 6 breakpoint and 4 watchpoint registers. Jul 10 00:22:58.734235 kernel: ASID allocator initialised with 32768 entries Jul 10 00:22:58.734241 kernel: ACPI: bus type PCI registered Jul 10 00:22:58.734249 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Jul 10 00:22:58.734255 kernel: Serial: AMBA PL011 UART driver Jul 10 00:22:58.734262 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Jul 10 00:22:58.734269 kernel: HugeTLB registered 32.0 MiB page size, pre-allocated 0 pages Jul 10 00:22:58.734275 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Jul 10 00:22:58.734282 kernel: HugeTLB registered 64.0 KiB page size, pre-allocated 0 pages Jul 10 00:22:58.734288 kernel: cryptd: max_cpu_qlen set to 1000 Jul 10 00:22:58.734295 kernel: alg: No test for fips(ansi_cprng) (fips_ansi_cprng) Jul 10 00:22:58.734302 kernel: ACPI: Added _OSI(Module Device) Jul 10 00:22:58.734334 kernel: ACPI: Added _OSI(Processor Device) Jul 10 00:22:58.734341 kernel: ACPI: Added _OSI(Processor Aggregator Device) Jul 10 00:22:58.734348 kernel: ACPI: Added _OSI(Linux-Dell-Video) Jul 10 00:22:58.734355 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Jul 10 00:22:58.734362 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Jul 10 00:22:58.734368 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded Jul 10 00:22:58.734375 kernel: ACPI: Interpreter enabled Jul 10 00:22:58.734382 kernel: ACPI: Using GIC for interrupt routing Jul 10 00:22:58.734412 kernel: ACPI: MCFG table detected, 1 entries Jul 10 00:22:58.734437 kernel: ARMH0011:00: ttyAMA0 at MMIO 0x9000000 (irq = 12, base_baud = 0) is a SBSA Jul 10 00:22:58.734444 kernel: printk: console [ttyAMA0] enabled Jul 10 00:22:58.734792 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff]) Jul 10 00:22:58.734930 kernel: acpi PNP0A08:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI HPX-Type3] Jul 10 00:22:58.734990 kernel: acpi PNP0A08:00: _OSC: platform does not support [LTR] Jul 10 00:22:58.735046 kernel: acpi PNP0A08:00: _OSC: OS now controls [PCIeHotplug PME AER PCIeCapability] Jul 10 00:22:58.735101 kernel: acpi PNP0A08:00: ECAM area [mem 0x4010000000-0x401fffffff] reserved by PNP0C02:00 Jul 10 00:22:58.735159 kernel: acpi PNP0A08:00: ECAM at [mem 0x4010000000-0x401fffffff] for [bus 00-ff] Jul 10 00:22:58.735168 kernel: ACPI: Remapped I/O 0x000000003eff0000 to [io 0x0000-0xffff window] Jul 10 00:22:58.735175 kernel: PCI host bridge to bus 0000:00 Jul 10 00:22:58.735242 kernel: pci_bus 0000:00: root bus resource [mem 0x10000000-0x3efeffff window] Jul 10 00:22:58.735293 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0xffff window] Jul 10 00:22:58.735348 kernel: pci_bus 0000:00: root bus resource [mem 0x8000000000-0xffffffffff window] Jul 10 00:22:58.735419 kernel: pci_bus 0000:00: root bus resource [bus 00-ff] Jul 10 00:22:58.735496 kernel: pci 0000:00:00.0: [1b36:0008] type 00 class 0x060000 Jul 10 00:22:58.735570 kernel: pci 0000:00:01.0: [1af4:1005] type 00 class 0x00ff00 Jul 10 00:22:58.735630 kernel: pci 0000:00:01.0: reg 0x10: [io 0x0000-0x001f] Jul 10 00:22:58.735701 kernel: pci 0000:00:01.0: reg 0x14: [mem 0x10000000-0x10000fff] Jul 10 00:22:58.735762 kernel: pci 0000:00:01.0: reg 0x20: [mem 0x8000000000-0x8000003fff 64bit pref] Jul 10 00:22:58.735820 kernel: pci 0000:00:01.0: BAR 4: assigned [mem 0x8000000000-0x8000003fff 64bit pref] Jul 10 00:22:58.735879 kernel: pci 0000:00:01.0: BAR 1: assigned [mem 0x10000000-0x10000fff] Jul 10 00:22:58.735940 kernel: pci 0000:00:01.0: BAR 0: assigned [io 0x1000-0x101f] Jul 10 00:22:58.735993 kernel: pci_bus 0000:00: resource 4 [mem 0x10000000-0x3efeffff window] Jul 10 00:22:58.736044 kernel: pci_bus 0000:00: resource 5 [io 0x0000-0xffff window] Jul 10 00:22:58.736098 kernel: pci_bus 0000:00: resource 6 [mem 0x8000000000-0xffffffffff window] Jul 10 00:22:58.736107 kernel: ACPI: PCI: Interrupt link GSI0 configured for IRQ 35 Jul 10 00:22:58.736115 kernel: ACPI: PCI: Interrupt link GSI1 configured for IRQ 36 Jul 10 00:22:58.736122 kernel: ACPI: PCI: Interrupt link GSI2 configured for IRQ 37 Jul 10 00:22:58.736128 kernel: ACPI: PCI: Interrupt link GSI3 configured for IRQ 38 Jul 10 00:22:58.736137 kernel: iommu: Default domain type: Translated Jul 10 00:22:58.736144 kernel: iommu: DMA domain TLB invalidation policy: strict mode Jul 10 00:22:58.736150 kernel: vgaarb: loaded Jul 10 00:22:58.736157 kernel: pps_core: LinuxPPS API ver. 1 registered Jul 10 00:22:58.736164 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Jul 10 00:22:58.736170 kernel: PTP clock support registered Jul 10 00:22:58.736177 kernel: Registered efivars operations Jul 10 00:22:58.736183 kernel: clocksource: Switched to clocksource arch_sys_counter Jul 10 00:22:58.736190 kernel: VFS: Disk quotas dquot_6.6.0 Jul 10 00:22:58.736198 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Jul 10 00:22:58.736204 kernel: pnp: PnP ACPI init Jul 10 00:22:58.736266 kernel: system 00:00: [mem 0x4010000000-0x401fffffff window] could not be reserved Jul 10 00:22:58.736275 kernel: pnp: PnP ACPI: found 1 devices Jul 10 00:22:58.736282 kernel: NET: Registered PF_INET protocol family Jul 10 00:22:58.736289 kernel: IP idents hash table entries: 65536 (order: 7, 524288 bytes, linear) Jul 10 00:22:58.736295 kernel: tcp_listen_portaddr_hash hash table entries: 2048 (order: 3, 32768 bytes, linear) Jul 10 00:22:58.736302 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Jul 10 00:22:58.736310 kernel: TCP established hash table entries: 32768 (order: 6, 262144 bytes, linear) Jul 10 00:22:58.736317 kernel: TCP bind hash table entries: 32768 (order: 7, 524288 bytes, linear) Jul 10 00:22:58.736324 kernel: TCP: Hash tables configured (established 32768 bind 32768) Jul 10 00:22:58.736330 kernel: UDP hash table entries: 2048 (order: 4, 65536 bytes, linear) Jul 10 00:22:58.736337 kernel: UDP-Lite hash table entries: 2048 (order: 4, 65536 bytes, linear) Jul 10 00:22:58.736343 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Jul 10 00:22:58.736350 kernel: PCI: CLS 0 bytes, default 64 Jul 10 00:22:58.736357 kernel: hw perfevents: enabled with armv8_pmuv3_0 PMU driver, 7 counters available Jul 10 00:22:58.736364 kernel: kvm [1]: HYP mode not available Jul 10 00:22:58.736373 kernel: Initialise system trusted keyrings Jul 10 00:22:58.736379 kernel: workingset: timestamp_bits=39 max_order=20 bucket_order=0 Jul 10 00:22:58.736394 kernel: Key type asymmetric registered Jul 10 00:22:58.736401 kernel: Asymmetric key parser 'x509' registered Jul 10 00:22:58.736408 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Jul 10 00:22:58.736415 kernel: io scheduler mq-deadline registered Jul 10 00:22:58.736421 kernel: io scheduler kyber registered Jul 10 00:22:58.736428 kernel: io scheduler bfq registered Jul 10 00:22:58.736435 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXSYBUS:00/PNP0C0C:00/input/input0 Jul 10 00:22:58.736443 kernel: ACPI: button: Power Button [PWRB] Jul 10 00:22:58.736451 kernel: ACPI: \_SB_.PCI0.GSI1: Enabled at IRQ 36 Jul 10 00:22:58.736514 kernel: virtio-pci 0000:00:01.0: enabling device (0005 -> 0007) Jul 10 00:22:58.736523 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Jul 10 00:22:58.736530 kernel: thunder_xcv, ver 1.0 Jul 10 00:22:58.736536 kernel: thunder_bgx, ver 1.0 Jul 10 00:22:58.736543 kernel: nicpf, ver 1.0 Jul 10 00:22:58.736550 kernel: nicvf, ver 1.0 Jul 10 00:22:58.736615 kernel: rtc-efi rtc-efi.0: registered as rtc0 Jul 10 00:22:58.736679 kernel: rtc-efi rtc-efi.0: setting system clock to 2025-07-10T00:22:58 UTC (1752106978) Jul 10 00:22:58.736688 kernel: hid: raw HID events driver (C) Jiri Kosina Jul 10 00:22:58.736695 kernel: NET: Registered PF_INET6 protocol family Jul 10 00:22:58.736728 kernel: Segment Routing with IPv6 Jul 10 00:22:58.736734 kernel: In-situ OAM (IOAM) with IPv6 Jul 10 00:22:58.736742 kernel: NET: Registered PF_PACKET protocol family Jul 10 00:22:58.736748 kernel: Key type dns_resolver registered Jul 10 00:22:58.736755 kernel: registered taskstats version 1 Jul 10 00:22:58.736764 kernel: Loading compiled-in X.509 certificates Jul 10 00:22:58.736770 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.186-flatcar: 9e274a0dc4fc3d34232d90d226b034c4fe0e3e22' Jul 10 00:22:58.736777 kernel: Key type .fscrypt registered Jul 10 00:22:58.736784 kernel: Key type fscrypt-provisioning registered Jul 10 00:22:58.736790 kernel: ima: No TPM chip found, activating TPM-bypass! Jul 10 00:22:58.736797 kernel: ima: Allocated hash algorithm: sha1 Jul 10 00:22:58.736804 kernel: ima: No architecture policies found Jul 10 00:22:58.736811 kernel: clk: Disabling unused clocks Jul 10 00:22:58.736838 kernel: Freeing unused kernel memory: 36416K Jul 10 00:22:58.736847 kernel: Run /init as init process Jul 10 00:22:58.737200 kernel: with arguments: Jul 10 00:22:58.737209 kernel: /init Jul 10 00:22:58.737215 kernel: with environment: Jul 10 00:22:58.737222 kernel: HOME=/ Jul 10 00:22:58.737229 kernel: TERM=linux Jul 10 00:22:58.737235 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Jul 10 00:22:58.737244 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Jul 10 00:22:58.737257 systemd[1]: Detected virtualization kvm. Jul 10 00:22:58.737264 systemd[1]: Detected architecture arm64. Jul 10 00:22:58.737271 systemd[1]: Running in initrd. Jul 10 00:22:58.737278 systemd[1]: No hostname configured, using default hostname. Jul 10 00:22:58.737285 systemd[1]: Hostname set to . Jul 10 00:22:58.737293 systemd[1]: Initializing machine ID from VM UUID. Jul 10 00:22:58.737300 systemd[1]: Queued start job for default target initrd.target. Jul 10 00:22:58.737307 systemd[1]: Started systemd-ask-password-console.path. Jul 10 00:22:58.737316 systemd[1]: Reached target cryptsetup.target. Jul 10 00:22:58.737323 systemd[1]: Reached target paths.target. Jul 10 00:22:58.737330 systemd[1]: Reached target slices.target. Jul 10 00:22:58.737337 systemd[1]: Reached target swap.target. Jul 10 00:22:58.737343 systemd[1]: Reached target timers.target. Jul 10 00:22:58.737351 systemd[1]: Listening on iscsid.socket. Jul 10 00:22:58.737358 systemd[1]: Listening on iscsiuio.socket. Jul 10 00:22:58.737366 systemd[1]: Listening on systemd-journald-audit.socket. Jul 10 00:22:58.737373 systemd[1]: Listening on systemd-journald-dev-log.socket. Jul 10 00:22:58.737380 systemd[1]: Listening on systemd-journald.socket. Jul 10 00:22:58.737398 systemd[1]: Listening on systemd-networkd.socket. Jul 10 00:22:58.737405 systemd[1]: Listening on systemd-udevd-control.socket. Jul 10 00:22:58.737412 systemd[1]: Listening on systemd-udevd-kernel.socket. Jul 10 00:22:58.737419 systemd[1]: Reached target sockets.target. Jul 10 00:22:58.737427 systemd[1]: Starting kmod-static-nodes.service... Jul 10 00:22:58.737433 systemd[1]: Finished network-cleanup.service. Jul 10 00:22:58.737442 systemd[1]: Starting systemd-fsck-usr.service... Jul 10 00:22:58.737450 systemd[1]: Starting systemd-journald.service... Jul 10 00:22:58.737457 systemd[1]: Starting systemd-modules-load.service... Jul 10 00:22:58.737464 systemd[1]: Starting systemd-resolved.service... Jul 10 00:22:58.737470 systemd[1]: Starting systemd-vconsole-setup.service... Jul 10 00:22:58.737477 systemd[1]: Finished kmod-static-nodes.service. Jul 10 00:22:58.737485 systemd[1]: Finished systemd-fsck-usr.service. Jul 10 00:22:58.737492 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Jul 10 00:22:58.737499 systemd[1]: Finished systemd-vconsole-setup.service. Jul 10 00:22:58.737512 systemd[1]: Starting dracut-cmdline-ask.service... Jul 10 00:22:58.737523 systemd-journald[289]: Journal started Jul 10 00:22:58.737573 systemd-journald[289]: Runtime Journal (/run/log/journal/0395f27e0a814ec18aaf48c1ab178f7c) is 6.0M, max 48.7M, 42.6M free. Jul 10 00:22:58.728831 systemd-modules-load[290]: Inserted module 'overlay' Jul 10 00:22:58.749032 systemd[1]: Started systemd-journald.service. Jul 10 00:22:58.749074 kernel: audit: type=1130 audit(1752106978.740:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:22:58.749087 kernel: audit: type=1130 audit(1752106978.741:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:22:58.740000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:22:58.741000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:22:58.741155 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Jul 10 00:22:58.752455 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Jul 10 00:22:58.752616 systemd[1]: Finished dracut-cmdline-ask.service. Jul 10 00:22:58.757572 kernel: audit: type=1130 audit(1752106978.752:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:22:58.757592 kernel: Bridge firewalling registered Jul 10 00:22:58.752000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:22:58.754100 systemd[1]: Starting dracut-cmdline.service... Jul 10 00:22:58.756115 systemd-modules-load[290]: Inserted module 'br_netfilter' Jul 10 00:22:58.756171 systemd-resolved[291]: Positive Trust Anchors: Jul 10 00:22:58.756178 systemd-resolved[291]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Jul 10 00:22:58.765000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:22:58.756204 systemd-resolved[291]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Jul 10 00:22:58.773090 kernel: audit: type=1130 audit(1752106978.765:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:22:58.773125 kernel: SCSI subsystem initialized Jul 10 00:22:58.760576 systemd-resolved[291]: Defaulting to hostname 'linux'. Jul 10 00:22:58.761415 systemd[1]: Started systemd-resolved.service. Jul 10 00:22:58.775248 dracut-cmdline[309]: dracut-dracut-053 Jul 10 00:22:58.765630 systemd[1]: Reached target nss-lookup.target. Jul 10 00:22:58.776835 dracut-cmdline[309]: Using kernel command line parameters: rd.driver.pre=btrfs BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected acpi=force verity.usrhash=97626bbec4e8c603c151f40dbbae5fabba3cda417023e06335ea30183b36a27f Jul 10 00:22:58.783643 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Jul 10 00:22:58.783699 kernel: device-mapper: uevent: version 1.0.3 Jul 10 00:22:58.783711 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Jul 10 00:22:58.785839 systemd-modules-load[290]: Inserted module 'dm_multipath' Jul 10 00:22:58.786568 systemd[1]: Finished systemd-modules-load.service. Jul 10 00:22:58.787000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:22:58.790427 kernel: audit: type=1130 audit(1752106978.787:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:22:58.788680 systemd[1]: Starting systemd-sysctl.service... Jul 10 00:22:58.797372 systemd[1]: Finished systemd-sysctl.service. Jul 10 00:22:58.800446 kernel: audit: type=1130 audit(1752106978.797:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:22:58.797000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:22:58.841416 kernel: Loading iSCSI transport class v2.0-870. Jul 10 00:22:58.853416 kernel: iscsi: registered transport (tcp) Jul 10 00:22:58.868410 kernel: iscsi: registered transport (qla4xxx) Jul 10 00:22:58.868461 kernel: QLogic iSCSI HBA Driver Jul 10 00:22:58.901405 systemd[1]: Finished dracut-cmdline.service. Jul 10 00:22:58.904446 kernel: audit: type=1130 audit(1752106978.901:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:22:58.901000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:22:58.903086 systemd[1]: Starting dracut-pre-udev.service... Jul 10 00:22:58.949415 kernel: raid6: neonx8 gen() 13507 MB/s Jul 10 00:22:58.966409 kernel: raid6: neonx8 xor() 10675 MB/s Jul 10 00:22:58.983406 kernel: raid6: neonx4 gen() 13384 MB/s Jul 10 00:22:59.000405 kernel: raid6: neonx4 xor() 11114 MB/s Jul 10 00:22:59.017401 kernel: raid6: neonx2 gen() 12897 MB/s Jul 10 00:22:59.034402 kernel: raid6: neonx2 xor() 10571 MB/s Jul 10 00:22:59.051400 kernel: raid6: neonx1 gen() 10488 MB/s Jul 10 00:22:59.068402 kernel: raid6: neonx1 xor() 8710 MB/s Jul 10 00:22:59.085400 kernel: raid6: int64x8 gen() 6228 MB/s Jul 10 00:22:59.102401 kernel: raid6: int64x8 xor() 3514 MB/s Jul 10 00:22:59.119401 kernel: raid6: int64x4 gen() 7192 MB/s Jul 10 00:22:59.136402 kernel: raid6: int64x4 xor() 3844 MB/s Jul 10 00:22:59.153400 kernel: raid6: int64x2 gen() 6121 MB/s Jul 10 00:22:59.170400 kernel: raid6: int64x2 xor() 3306 MB/s Jul 10 00:22:59.187400 kernel: raid6: int64x1 gen() 5015 MB/s Jul 10 00:22:59.204609 kernel: raid6: int64x1 xor() 2631 MB/s Jul 10 00:22:59.204620 kernel: raid6: using algorithm neonx8 gen() 13507 MB/s Jul 10 00:22:59.204629 kernel: raid6: .... xor() 10675 MB/s, rmw enabled Jul 10 00:22:59.204637 kernel: raid6: using neon recovery algorithm Jul 10 00:22:59.215400 kernel: xor: measuring software checksum speed Jul 10 00:22:59.215417 kernel: 8regs : 17206 MB/sec Jul 10 00:22:59.216836 kernel: 32regs : 19404 MB/sec Jul 10 00:22:59.216848 kernel: arm64_neon : 27794 MB/sec Jul 10 00:22:59.216857 kernel: xor: using function: arm64_neon (27794 MB/sec) Jul 10 00:22:59.275402 kernel: Btrfs loaded, crc32c=crc32c-generic, zoned=no, fsverity=no Jul 10 00:22:59.285200 systemd[1]: Finished dracut-pre-udev.service. Jul 10 00:22:59.285000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:22:59.287000 audit: BPF prog-id=7 op=LOAD Jul 10 00:22:59.288908 kernel: audit: type=1130 audit(1752106979.285:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:22:59.288932 kernel: audit: type=1334 audit(1752106979.287:10): prog-id=7 op=LOAD Jul 10 00:22:59.288000 audit: BPF prog-id=8 op=LOAD Jul 10 00:22:59.289366 systemd[1]: Starting systemd-udevd.service... Jul 10 00:22:59.302961 systemd-udevd[491]: Using default interface naming scheme 'v252'. Jul 10 00:22:59.306305 systemd[1]: Started systemd-udevd.service. Jul 10 00:22:59.306000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:22:59.308611 systemd[1]: Starting dracut-pre-trigger.service... Jul 10 00:22:59.320219 dracut-pre-trigger[499]: rd.md=0: removing MD RAID activation Jul 10 00:22:59.348496 systemd[1]: Finished dracut-pre-trigger.service. Jul 10 00:22:59.348000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:22:59.349929 systemd[1]: Starting systemd-udev-trigger.service... Jul 10 00:22:59.385303 systemd[1]: Finished systemd-udev-trigger.service. Jul 10 00:22:59.385000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:22:59.406407 kernel: virtio_blk virtio1: [vda] 19775488 512-byte logical blocks (10.1 GB/9.43 GiB) Jul 10 00:22:59.411527 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Jul 10 00:22:59.411551 kernel: GPT:9289727 != 19775487 Jul 10 00:22:59.411567 kernel: GPT:Alternate GPT header not at the end of the disk. Jul 10 00:22:59.411576 kernel: GPT:9289727 != 19775487 Jul 10 00:22:59.411588 kernel: GPT: Use GNU Parted to correct GPT errors. Jul 10 00:22:59.411596 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Jul 10 00:22:59.425414 kernel: BTRFS: device label OEM devid 1 transid 10 /dev/vda6 scanned by (udev-worker) (538) Jul 10 00:22:59.431795 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Jul 10 00:22:59.434637 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Jul 10 00:22:59.435691 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Jul 10 00:22:59.442671 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Jul 10 00:22:59.446018 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Jul 10 00:22:59.447707 systemd[1]: Starting disk-uuid.service... Jul 10 00:22:59.454364 disk-uuid[562]: Primary Header is updated. Jul 10 00:22:59.454364 disk-uuid[562]: Secondary Entries is updated. Jul 10 00:22:59.454364 disk-uuid[562]: Secondary Header is updated. Jul 10 00:22:59.457407 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Jul 10 00:23:00.465413 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Jul 10 00:23:00.465596 disk-uuid[563]: The operation has completed successfully. Jul 10 00:23:00.485551 systemd[1]: disk-uuid.service: Deactivated successfully. Jul 10 00:23:00.485000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:23:00.485000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:23:00.485657 systemd[1]: Finished disk-uuid.service. Jul 10 00:23:00.489677 systemd[1]: Starting verity-setup.service... Jul 10 00:23:00.504415 kernel: device-mapper: verity: sha256 using implementation "sha256-ce" Jul 10 00:23:00.524062 systemd[1]: Found device dev-mapper-usr.device. Jul 10 00:23:00.525441 systemd[1]: Mounting sysusr-usr.mount... Jul 10 00:23:00.526128 systemd[1]: Finished verity-setup.service. Jul 10 00:23:00.526000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:23:00.576432 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Jul 10 00:23:00.576874 systemd[1]: Mounted sysusr-usr.mount. Jul 10 00:23:00.577539 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Jul 10 00:23:00.578247 systemd[1]: Starting ignition-setup.service... Jul 10 00:23:00.580459 systemd[1]: Starting parse-ip-for-networkd.service... Jul 10 00:23:00.586752 kernel: BTRFS info (device vda6): using crc32c (crc32c-generic) checksum algorithm Jul 10 00:23:00.586790 kernel: BTRFS info (device vda6): using free space tree Jul 10 00:23:00.586800 kernel: BTRFS info (device vda6): has skinny extents Jul 10 00:23:00.595004 systemd[1]: mnt-oem.mount: Deactivated successfully. Jul 10 00:23:00.600588 systemd[1]: Finished ignition-setup.service. Jul 10 00:23:00.600000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:23:00.602023 systemd[1]: Starting ignition-fetch-offline.service... Jul 10 00:23:00.670914 systemd[1]: Finished parse-ip-for-networkd.service. Jul 10 00:23:00.673053 systemd[1]: Starting systemd-networkd.service... Jul 10 00:23:00.671000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:23:00.672000 audit: BPF prog-id=9 op=LOAD Jul 10 00:23:00.681724 ignition[643]: Ignition 2.14.0 Jul 10 00:23:00.681735 ignition[643]: Stage: fetch-offline Jul 10 00:23:00.681777 ignition[643]: no configs at "/usr/lib/ignition/base.d" Jul 10 00:23:00.681787 ignition[643]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" Jul 10 00:23:00.681923 ignition[643]: parsed url from cmdline: "" Jul 10 00:23:00.681927 ignition[643]: no config URL provided Jul 10 00:23:00.681931 ignition[643]: reading system config file "/usr/lib/ignition/user.ign" Jul 10 00:23:00.681938 ignition[643]: no config at "/usr/lib/ignition/user.ign" Jul 10 00:23:00.681956 ignition[643]: op(1): [started] loading QEMU firmware config module Jul 10 00:23:00.681960 ignition[643]: op(1): executing: "modprobe" "qemu_fw_cfg" Jul 10 00:23:00.687092 ignition[643]: op(1): [finished] loading QEMU firmware config module Jul 10 00:23:00.693147 ignition[643]: parsing config with SHA512: 4c44a000b41eaedc40d156473c6fea5769670b707bc2528e05611d0f8880d2650952ed6c7e3d6aac2a3b50e5b156061f5d1022ff0377e23cb2c66b7c2bdce05f Jul 10 00:23:00.698555 unknown[643]: fetched base config from "system" Jul 10 00:23:00.698571 unknown[643]: fetched user config from "qemu" Jul 10 00:23:00.698951 ignition[643]: fetch-offline: fetch-offline passed Jul 10 00:23:00.698796 systemd-networkd[740]: lo: Link UP Jul 10 00:23:00.699023 ignition[643]: Ignition finished successfully Jul 10 00:23:00.700000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:23:00.701000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:23:00.698799 systemd-networkd[740]: lo: Gained carrier Jul 10 00:23:00.699166 systemd-networkd[740]: Enumeration completed Jul 10 00:23:00.699427 systemd-networkd[740]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Jul 10 00:23:00.699446 systemd[1]: Started systemd-networkd.service. Jul 10 00:23:00.700322 systemd-networkd[740]: eth0: Link UP Jul 10 00:23:00.700325 systemd-networkd[740]: eth0: Gained carrier Jul 10 00:23:00.700763 systemd[1]: Finished ignition-fetch-offline.service. Jul 10 00:23:00.701746 systemd[1]: Reached target network.target. Jul 10 00:23:00.702724 systemd[1]: ignition-fetch.service was skipped because of an unmet condition check (ConditionPathExists=!/run/ignition.json). Jul 10 00:23:00.703461 systemd[1]: Starting ignition-kargs.service... Jul 10 00:23:00.704915 systemd[1]: Starting iscsiuio.service... Jul 10 00:23:00.712495 ignition[744]: Ignition 2.14.0 Jul 10 00:23:00.712505 ignition[744]: Stage: kargs Jul 10 00:23:00.712603 ignition[744]: no configs at "/usr/lib/ignition/base.d" Jul 10 00:23:00.715000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:23:00.715286 systemd[1]: Finished ignition-kargs.service. Jul 10 00:23:00.712613 ignition[744]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" Jul 10 00:23:00.716848 systemd[1]: Starting ignition-disks.service... Jul 10 00:23:00.718000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:23:00.713254 ignition[744]: kargs: kargs passed Jul 10 00:23:00.717785 systemd[1]: Started iscsiuio.service. Jul 10 00:23:00.713295 ignition[744]: Ignition finished successfully Jul 10 00:23:00.719822 systemd[1]: Starting iscsid.service... Jul 10 00:23:00.722468 systemd-networkd[740]: eth0: DHCPv4 address 10.0.0.22/16, gateway 10.0.0.1 acquired from 10.0.0.1 Jul 10 00:23:00.724450 iscsid[756]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Jul 10 00:23:00.724450 iscsid[756]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Jul 10 00:23:00.724450 iscsid[756]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Jul 10 00:23:00.724450 iscsid[756]: If using hardware iscsi like qla4xxx this message can be ignored. Jul 10 00:23:00.724450 iscsid[756]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Jul 10 00:23:00.724450 iscsid[756]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Jul 10 00:23:00.730000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:23:00.731000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:23:00.724414 ignition[752]: Ignition 2.14.0 Jul 10 00:23:00.726549 systemd[1]: Finished ignition-disks.service. Jul 10 00:23:00.724420 ignition[752]: Stage: disks Jul 10 00:23:00.730874 systemd[1]: Started iscsid.service. Jul 10 00:23:00.724511 ignition[752]: no configs at "/usr/lib/ignition/base.d" Jul 10 00:23:00.732055 systemd[1]: Reached target initrd-root-device.target. Jul 10 00:23:00.724520 ignition[752]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" Jul 10 00:23:00.733408 systemd[1]: Reached target local-fs-pre.target. Jul 10 00:23:00.725227 ignition[752]: disks: disks passed Jul 10 00:23:00.734980 systemd[1]: Reached target local-fs.target. Jul 10 00:23:00.725264 ignition[752]: Ignition finished successfully Jul 10 00:23:00.736449 systemd[1]: Reached target sysinit.target. Jul 10 00:23:00.737470 systemd[1]: Reached target basic.target. Jul 10 00:23:00.739484 systemd[1]: Starting dracut-initqueue.service... Jul 10 00:23:00.749832 systemd[1]: Finished dracut-initqueue.service. Jul 10 00:23:00.750000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:23:00.750791 systemd[1]: Reached target remote-fs-pre.target. Jul 10 00:23:00.751947 systemd[1]: Reached target remote-cryptsetup.target. Jul 10 00:23:00.753170 systemd[1]: Reached target remote-fs.target. Jul 10 00:23:00.755117 systemd[1]: Starting dracut-pre-mount.service... Jul 10 00:23:00.762834 systemd[1]: Finished dracut-pre-mount.service. Jul 10 00:23:00.763000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:23:00.764345 systemd[1]: Starting systemd-fsck-root.service... Jul 10 00:23:00.774424 systemd-fsck[775]: ROOT: clean, 619/553520 files, 56022/553472 blocks Jul 10 00:23:00.777477 systemd[1]: Finished systemd-fsck-root.service. Jul 10 00:23:00.778000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:23:00.781222 systemd[1]: Mounting sysroot.mount... Jul 10 00:23:00.787416 kernel: EXT4-fs (vda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Jul 10 00:23:00.787515 systemd[1]: Mounted sysroot.mount. Jul 10 00:23:00.788237 systemd[1]: Reached target initrd-root-fs.target. Jul 10 00:23:00.790223 systemd[1]: Mounting sysroot-usr.mount... Jul 10 00:23:00.791126 systemd[1]: flatcar-metadata-hostname.service was skipped because no trigger condition checks were met. Jul 10 00:23:00.791165 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Jul 10 00:23:00.791187 systemd[1]: Reached target ignition-diskful.target. Jul 10 00:23:00.792942 systemd[1]: Mounted sysroot-usr.mount. Jul 10 00:23:00.794647 systemd[1]: Starting initrd-setup-root.service... Jul 10 00:23:00.798902 initrd-setup-root[785]: cut: /sysroot/etc/passwd: No such file or directory Jul 10 00:23:00.802331 initrd-setup-root[793]: cut: /sysroot/etc/group: No such file or directory Jul 10 00:23:00.806112 initrd-setup-root[801]: cut: /sysroot/etc/shadow: No such file or directory Jul 10 00:23:00.809991 initrd-setup-root[809]: cut: /sysroot/etc/gshadow: No such file or directory Jul 10 00:23:00.836272 systemd[1]: Finished initrd-setup-root.service. Jul 10 00:23:00.836000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:23:00.837731 systemd[1]: Starting ignition-mount.service... Jul 10 00:23:00.838905 systemd[1]: Starting sysroot-boot.service... Jul 10 00:23:00.843018 bash[826]: umount: /sysroot/usr/share/oem: not mounted. Jul 10 00:23:00.851784 ignition[828]: INFO : Ignition 2.14.0 Jul 10 00:23:00.851784 ignition[828]: INFO : Stage: mount Jul 10 00:23:00.853601 ignition[828]: INFO : no configs at "/usr/lib/ignition/base.d" Jul 10 00:23:00.853601 ignition[828]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" Jul 10 00:23:00.853601 ignition[828]: INFO : mount: mount passed Jul 10 00:23:00.853601 ignition[828]: INFO : Ignition finished successfully Jul 10 00:23:00.854000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:23:00.856000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:23:00.853720 systemd[1]: Finished ignition-mount.service. Jul 10 00:23:00.855888 systemd[1]: Finished sysroot-boot.service. Jul 10 00:23:01.533255 systemd[1]: Mounting sysroot-usr-share-oem.mount... Jul 10 00:23:01.540886 kernel: BTRFS: device label OEM devid 1 transid 11 /dev/vda6 scanned by mount (836) Jul 10 00:23:01.540926 kernel: BTRFS info (device vda6): using crc32c (crc32c-generic) checksum algorithm Jul 10 00:23:01.540936 kernel: BTRFS info (device vda6): using free space tree Jul 10 00:23:01.541818 kernel: BTRFS info (device vda6): has skinny extents Jul 10 00:23:01.544778 systemd[1]: Mounted sysroot-usr-share-oem.mount. Jul 10 00:23:01.546160 systemd[1]: Starting ignition-files.service... Jul 10 00:23:01.561393 ignition[856]: INFO : Ignition 2.14.0 Jul 10 00:23:01.561393 ignition[856]: INFO : Stage: files Jul 10 00:23:01.562723 ignition[856]: INFO : no configs at "/usr/lib/ignition/base.d" Jul 10 00:23:01.562723 ignition[856]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" Jul 10 00:23:01.562723 ignition[856]: DEBUG : files: compiled without relabeling support, skipping Jul 10 00:23:01.565021 ignition[856]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Jul 10 00:23:01.565021 ignition[856]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Jul 10 00:23:01.567305 ignition[856]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Jul 10 00:23:01.568334 ignition[856]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Jul 10 00:23:01.568334 ignition[856]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Jul 10 00:23:01.568023 unknown[856]: wrote ssh authorized keys file for user: core Jul 10 00:23:01.571282 ignition[856]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/home/core/install.sh" Jul 10 00:23:01.571282 ignition[856]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/home/core/install.sh" Jul 10 00:23:01.571282 ignition[856]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/etc/flatcar/update.conf" Jul 10 00:23:01.571282 ignition[856]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/etc/flatcar/update.conf" Jul 10 00:23:01.571282 ignition[856]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.32.4-arm64.raw" Jul 10 00:23:01.571282 ignition[856]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.32.4-arm64.raw" Jul 10 00:23:01.571282 ignition[856]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.32.4-arm64.raw" Jul 10 00:23:01.571282 ignition[856]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET https://extensions.flatcar.org/extensions/kubernetes-v1.32.4-arm64.raw: attempt #1 Jul 10 00:23:02.170507 systemd-networkd[740]: eth0: Gained IPv6LL Jul 10 00:23:02.237607 ignition[856]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET result: OK Jul 10 00:23:02.921230 ignition[856]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.32.4-arm64.raw" Jul 10 00:23:02.921230 ignition[856]: INFO : files: op(7): [started] processing unit "coreos-metadata.service" Jul 10 00:23:02.924520 ignition[856]: INFO : files: op(7): op(8): [started] writing unit "coreos-metadata.service" at "/sysroot/etc/systemd/system/coreos-metadata.service" Jul 10 00:23:02.924520 ignition[856]: INFO : files: op(7): op(8): [finished] writing unit "coreos-metadata.service" at "/sysroot/etc/systemd/system/coreos-metadata.service" Jul 10 00:23:02.924520 ignition[856]: INFO : files: op(7): [finished] processing unit "coreos-metadata.service" Jul 10 00:23:02.924520 ignition[856]: INFO : files: op(9): [started] setting preset to disabled for "coreos-metadata.service" Jul 10 00:23:02.924520 ignition[856]: INFO : files: op(9): op(a): [started] removing enablement symlink(s) for "coreos-metadata.service" Jul 10 00:23:02.958413 ignition[856]: INFO : files: op(9): op(a): [finished] removing enablement symlink(s) for "coreos-metadata.service" Jul 10 00:23:02.958413 ignition[856]: INFO : files: op(9): [finished] setting preset to disabled for "coreos-metadata.service" Jul 10 00:23:02.958413 ignition[856]: INFO : files: createResultFile: createFiles: op(b): [started] writing file "/sysroot/etc/.ignition-result.json" Jul 10 00:23:02.958413 ignition[856]: INFO : files: createResultFile: createFiles: op(b): [finished] writing file "/sysroot/etc/.ignition-result.json" Jul 10 00:23:02.958413 ignition[856]: INFO : files: files passed Jul 10 00:23:02.958413 ignition[856]: INFO : Ignition finished successfully Jul 10 00:23:02.964671 systemd[1]: Finished ignition-files.service. Jul 10 00:23:02.964000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:23:02.966763 systemd[1]: Starting initrd-setup-root-after-ignition.service... Jul 10 00:23:02.967471 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Jul 10 00:23:02.968256 systemd[1]: Starting ignition-quench.service... Jul 10 00:23:02.971084 systemd[1]: ignition-quench.service: Deactivated successfully. Jul 10 00:23:02.971177 systemd[1]: Finished ignition-quench.service. Jul 10 00:23:02.973603 initrd-setup-root-after-ignition[882]: grep: /sysroot/usr/share/oem/oem-release: No such file or directory Jul 10 00:23:02.971000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:23:02.971000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:23:02.975665 initrd-setup-root-after-ignition[884]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Jul 10 00:23:02.976490 systemd[1]: Finished initrd-setup-root-after-ignition.service. Jul 10 00:23:02.977000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:23:02.982576 systemd[1]: Reached target ignition-complete.target. Jul 10 00:23:02.984613 systemd[1]: Starting initrd-parse-etc.service... Jul 10 00:23:03.002088 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Jul 10 00:23:03.002206 systemd[1]: Finished initrd-parse-etc.service. Jul 10 00:23:03.003000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:23:03.003000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:23:03.004122 systemd[1]: Reached target initrd-fs.target. Jul 10 00:23:03.007625 systemd[1]: Reached target initrd.target. Jul 10 00:23:03.008995 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Jul 10 00:23:03.009852 systemd[1]: Starting dracut-pre-pivot.service... Jul 10 00:23:03.020285 systemd[1]: Finished dracut-pre-pivot.service. Jul 10 00:23:03.024080 kernel: kauditd_printk_skb: 28 callbacks suppressed Jul 10 00:23:03.024105 kernel: audit: type=1130 audit(1752106983.020:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:23:03.020000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:23:03.022018 systemd[1]: Starting initrd-cleanup.service... Jul 10 00:23:03.030268 systemd[1]: Stopped target nss-lookup.target. Jul 10 00:23:03.031201 systemd[1]: Stopped target remote-cryptsetup.target. Jul 10 00:23:03.032602 systemd[1]: Stopped target timers.target. Jul 10 00:23:03.034163 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Jul 10 00:23:03.040777 kernel: audit: type=1131 audit(1752106983.035:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:23:03.035000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:23:03.034278 systemd[1]: Stopped dracut-pre-pivot.service. Jul 10 00:23:03.035559 systemd[1]: Stopped target initrd.target. Jul 10 00:23:03.042018 systemd[1]: Stopped target basic.target. Jul 10 00:23:03.043284 systemd[1]: Stopped target ignition-complete.target. Jul 10 00:23:03.045815 systemd[1]: Stopped target ignition-diskful.target. Jul 10 00:23:03.046748 systemd[1]: Stopped target initrd-root-device.target. Jul 10 00:23:03.050669 systemd[1]: Stopped target remote-fs.target. Jul 10 00:23:03.052868 systemd[1]: Stopped target remote-fs-pre.target. Jul 10 00:23:03.055250 systemd[1]: Stopped target sysinit.target. Jul 10 00:23:03.056656 systemd[1]: Stopped target local-fs.target. Jul 10 00:23:03.061000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:23:03.057978 systemd[1]: Stopped target local-fs-pre.target. Jul 10 00:23:03.065089 kernel: audit: type=1131 audit(1752106983.061:41): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:23:03.059375 systemd[1]: Stopped target swap.target. Jul 10 00:23:03.065000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:23:03.060655 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Jul 10 00:23:03.070962 kernel: audit: type=1131 audit(1752106983.065:42): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:23:03.070979 kernel: audit: type=1131 audit(1752106983.068:43): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:23:03.068000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:23:03.060781 systemd[1]: Stopped dracut-pre-mount.service. Jul 10 00:23:03.061911 systemd[1]: Stopped target cryptsetup.target. Jul 10 00:23:03.064689 systemd[1]: dracut-initqueue.service: Deactivated successfully. Jul 10 00:23:03.064801 systemd[1]: Stopped dracut-initqueue.service. Jul 10 00:23:03.065939 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Jul 10 00:23:03.066037 systemd[1]: Stopped ignition-fetch-offline.service. Jul 10 00:23:03.068795 systemd[1]: Stopped target paths.target. Jul 10 00:23:03.071688 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Jul 10 00:23:03.075418 systemd[1]: Stopped systemd-ask-password-console.path. Jul 10 00:23:03.076593 systemd[1]: Stopped target slices.target. Jul 10 00:23:03.077928 systemd[1]: Stopped target sockets.target. Jul 10 00:23:03.080000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:23:03.079286 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Jul 10 00:23:03.085867 kernel: audit: type=1131 audit(1752106983.080:44): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:23:03.085890 kernel: audit: type=1131 audit(1752106983.083:45): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:23:03.083000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:23:03.079425 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Jul 10 00:23:03.087184 iscsid[756]: iscsid shutting down. Jul 10 00:23:03.080608 systemd[1]: ignition-files.service: Deactivated successfully. Jul 10 00:23:03.080717 systemd[1]: Stopped ignition-files.service. Jul 10 00:23:03.084337 systemd[1]: Stopping ignition-mount.service... Jul 10 00:23:03.087419 systemd[1]: Stopping iscsid.service... Jul 10 00:23:03.088971 systemd[1]: Stopping sysroot-boot.service... Jul 10 00:23:03.097705 kernel: audit: type=1131 audit(1752106983.090:46): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:23:03.097730 kernel: audit: type=1131 audit(1752106983.093:47): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:23:03.090000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:23:03.093000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:23:03.097810 ignition[897]: INFO : Ignition 2.14.0 Jul 10 00:23:03.097810 ignition[897]: INFO : Stage: umount Jul 10 00:23:03.097810 ignition[897]: INFO : no configs at "/usr/lib/ignition/base.d" Jul 10 00:23:03.097810 ignition[897]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" Jul 10 00:23:03.097810 ignition[897]: INFO : umount: umount passed Jul 10 00:23:03.097810 ignition[897]: INFO : Ignition finished successfully Jul 10 00:23:03.107787 kernel: audit: type=1131 audit(1752106983.097:48): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:23:03.097000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:23:03.099000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:23:03.103000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:23:03.105000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:23:03.106000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:23:03.089777 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Jul 10 00:23:03.089918 systemd[1]: Stopped systemd-udev-trigger.service. Jul 10 00:23:03.109000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:23:03.109000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:23:03.091029 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Jul 10 00:23:03.110000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:23:03.091122 systemd[1]: Stopped dracut-pre-trigger.service. Jul 10 00:23:03.095523 systemd[1]: iscsid.service: Deactivated successfully. Jul 10 00:23:03.095623 systemd[1]: Stopped iscsid.service. Jul 10 00:23:03.098629 systemd[1]: ignition-mount.service: Deactivated successfully. Jul 10 00:23:03.098722 systemd[1]: Stopped ignition-mount.service. Jul 10 00:23:03.100347 systemd[1]: sysroot-boot.mount: Deactivated successfully. Jul 10 00:23:03.100887 systemd[1]: iscsid.socket: Deactivated successfully. Jul 10 00:23:03.100961 systemd[1]: Closed iscsid.socket. Jul 10 00:23:03.102431 systemd[1]: ignition-disks.service: Deactivated successfully. Jul 10 00:23:03.102474 systemd[1]: Stopped ignition-disks.service. Jul 10 00:23:03.104104 systemd[1]: ignition-kargs.service: Deactivated successfully. Jul 10 00:23:03.104140 systemd[1]: Stopped ignition-kargs.service. Jul 10 00:23:03.105907 systemd[1]: ignition-setup.service: Deactivated successfully. Jul 10 00:23:03.105945 systemd[1]: Stopped ignition-setup.service. Jul 10 00:23:03.107710 systemd[1]: Stopping iscsiuio.service... Jul 10 00:23:03.108416 systemd[1]: initrd-cleanup.service: Deactivated successfully. Jul 10 00:23:03.108499 systemd[1]: Finished initrd-cleanup.service. Jul 10 00:23:03.109790 systemd[1]: iscsiuio.service: Deactivated successfully. Jul 10 00:23:03.109863 systemd[1]: Stopped iscsiuio.service. Jul 10 00:23:03.125000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:23:03.111677 systemd[1]: Stopped target network.target. Jul 10 00:23:03.126000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:23:03.113310 systemd[1]: iscsiuio.socket: Deactivated successfully. Jul 10 00:23:03.113345 systemd[1]: Closed iscsiuio.socket. Jul 10 00:23:03.114407 systemd[1]: Stopping systemd-networkd.service... Jul 10 00:23:03.115485 systemd[1]: Stopping systemd-resolved.service... Jul 10 00:23:03.130000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:23:03.131000 audit: BPF prog-id=6 op=UNLOAD Jul 10 00:23:03.131000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:23:03.122878 systemd-networkd[740]: eth0: DHCPv6 lease lost Jul 10 00:23:03.132000 audit: BPF prog-id=9 op=UNLOAD Jul 10 00:23:03.132000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:23:03.124684 systemd[1]: systemd-networkd.service: Deactivated successfully. Jul 10 00:23:03.124923 systemd[1]: Stopped systemd-networkd.service. Jul 10 00:23:03.126401 systemd[1]: systemd-resolved.service: Deactivated successfully. Jul 10 00:23:03.126486 systemd[1]: Stopped systemd-resolved.service. Jul 10 00:23:03.127553 systemd[1]: systemd-networkd.socket: Deactivated successfully. Jul 10 00:23:03.127580 systemd[1]: Closed systemd-networkd.socket. Jul 10 00:23:03.129021 systemd[1]: Stopping network-cleanup.service... Jul 10 00:23:03.129898 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Jul 10 00:23:03.129953 systemd[1]: Stopped parse-ip-for-networkd.service. Jul 10 00:23:03.131108 systemd[1]: systemd-sysctl.service: Deactivated successfully. Jul 10 00:23:03.141000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:23:03.142000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:23:03.131151 systemd[1]: Stopped systemd-sysctl.service. Jul 10 00:23:03.132474 systemd[1]: systemd-modules-load.service: Deactivated successfully. Jul 10 00:23:03.132513 systemd[1]: Stopped systemd-modules-load.service. Jul 10 00:23:03.136378 systemd[1]: Stopping systemd-udevd.service... Jul 10 00:23:03.146000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:23:03.138358 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Jul 10 00:23:03.147000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:23:03.138854 systemd[1]: sysroot-boot.service: Deactivated successfully. Jul 10 00:23:03.149000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:23:03.138935 systemd[1]: Stopped sysroot-boot.service. Jul 10 00:23:03.150000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:23:03.142041 systemd[1]: systemd-udevd.service: Deactivated successfully. Jul 10 00:23:03.142148 systemd[1]: Stopped systemd-udevd.service. Jul 10 00:23:03.143767 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Jul 10 00:23:03.153000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:23:03.143811 systemd[1]: Closed systemd-udevd-control.socket. Jul 10 00:23:03.154000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:23:03.144735 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Jul 10 00:23:03.155000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:23:03.144763 systemd[1]: Closed systemd-udevd-kernel.socket. Jul 10 00:23:03.145963 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Jul 10 00:23:03.145997 systemd[1]: Stopped dracut-pre-udev.service. Jul 10 00:23:03.157000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:23:03.147039 systemd[1]: dracut-cmdline.service: Deactivated successfully. Jul 10 00:23:03.158000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:23:03.158000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:23:03.147073 systemd[1]: Stopped dracut-cmdline.service. Jul 10 00:23:03.148132 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Jul 10 00:23:03.148167 systemd[1]: Stopped dracut-cmdline-ask.service. Jul 10 00:23:03.149470 systemd[1]: initrd-setup-root.service: Deactivated successfully. Jul 10 00:23:03.149502 systemd[1]: Stopped initrd-setup-root.service. Jul 10 00:23:03.151238 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Jul 10 00:23:03.152319 systemd[1]: systemd-tmpfiles-setup-dev.service: Deactivated successfully. Jul 10 00:23:03.152366 systemd[1]: Stopped systemd-tmpfiles-setup-dev.service. Jul 10 00:23:03.154082 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Jul 10 00:23:03.154118 systemd[1]: Stopped kmod-static-nodes.service. Jul 10 00:23:03.154779 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Jul 10 00:23:03.154813 systemd[1]: Stopped systemd-vconsole-setup.service. Jul 10 00:23:03.156582 systemd[1]: run-credentials-systemd\x2dtmpfiles\x2dsetup\x2ddev.service.mount: Deactivated successfully. Jul 10 00:23:03.157002 systemd[1]: network-cleanup.service: Deactivated successfully. Jul 10 00:23:03.157082 systemd[1]: Stopped network-cleanup.service. Jul 10 00:23:03.158380 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Jul 10 00:23:03.158465 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Jul 10 00:23:03.159363 systemd[1]: Reached target initrd-switch-root.target. Jul 10 00:23:03.160996 systemd[1]: Starting initrd-switch-root.service... Jul 10 00:23:03.167021 systemd[1]: Switching root. Jul 10 00:23:03.186639 systemd-journald[289]: Journal stopped Jul 10 00:23:05.124239 systemd-journald[289]: Received SIGTERM from PID 1 (systemd). Jul 10 00:23:05.124295 kernel: SELinux: Class mctp_socket not defined in policy. Jul 10 00:23:05.124307 kernel: SELinux: Class anon_inode not defined in policy. Jul 10 00:23:05.124323 kernel: SELinux: the above unknown classes and permissions will be allowed Jul 10 00:23:05.124335 kernel: SELinux: policy capability network_peer_controls=1 Jul 10 00:23:05.124345 kernel: SELinux: policy capability open_perms=1 Jul 10 00:23:05.124354 kernel: SELinux: policy capability extended_socket_class=1 Jul 10 00:23:05.124364 kernel: SELinux: policy capability always_check_network=0 Jul 10 00:23:05.124374 kernel: SELinux: policy capability cgroup_seclabel=1 Jul 10 00:23:05.124383 kernel: SELinux: policy capability nnp_nosuid_transition=1 Jul 10 00:23:05.124415 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Jul 10 00:23:05.124424 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Jul 10 00:23:05.124434 systemd[1]: Successfully loaded SELinux policy in 31.647ms. Jul 10 00:23:05.124452 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 7.189ms. Jul 10 00:23:05.124463 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Jul 10 00:23:05.124473 systemd[1]: Detected virtualization kvm. Jul 10 00:23:05.124483 systemd[1]: Detected architecture arm64. Jul 10 00:23:05.124493 systemd[1]: Detected first boot. Jul 10 00:23:05.124504 systemd[1]: Initializing machine ID from VM UUID. Jul 10 00:23:05.124514 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). Jul 10 00:23:05.124524 systemd[1]: Populated /etc with preset unit settings. Jul 10 00:23:05.124535 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Jul 10 00:23:05.124550 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Jul 10 00:23:05.124562 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Jul 10 00:23:05.124573 systemd[1]: initrd-switch-root.service: Deactivated successfully. Jul 10 00:23:05.124583 systemd[1]: Stopped initrd-switch-root.service. Jul 10 00:23:05.124594 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Jul 10 00:23:05.124606 systemd[1]: Created slice system-addon\x2dconfig.slice. Jul 10 00:23:05.124617 systemd[1]: Created slice system-addon\x2drun.slice. Jul 10 00:23:05.124627 systemd[1]: Created slice system-getty.slice. Jul 10 00:23:05.124643 systemd[1]: Created slice system-modprobe.slice. Jul 10 00:23:05.124655 systemd[1]: Created slice system-serial\x2dgetty.slice. Jul 10 00:23:05.124668 systemd[1]: Created slice system-system\x2dcloudinit.slice. Jul 10 00:23:05.124680 systemd[1]: Created slice system-systemd\x2dfsck.slice. Jul 10 00:23:05.124690 systemd[1]: Created slice user.slice. Jul 10 00:23:05.124700 systemd[1]: Started systemd-ask-password-console.path. Jul 10 00:23:05.124712 systemd[1]: Started systemd-ask-password-wall.path. Jul 10 00:23:05.124723 systemd[1]: Set up automount boot.automount. Jul 10 00:23:05.124735 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Jul 10 00:23:05.124745 systemd[1]: Stopped target initrd-switch-root.target. Jul 10 00:23:05.124755 systemd[1]: Stopped target initrd-fs.target. Jul 10 00:23:05.124768 systemd[1]: Stopped target initrd-root-fs.target. Jul 10 00:23:05.124778 systemd[1]: Reached target integritysetup.target. Jul 10 00:23:05.124789 systemd[1]: Reached target remote-cryptsetup.target. Jul 10 00:23:05.124799 systemd[1]: Reached target remote-fs.target. Jul 10 00:23:05.124809 systemd[1]: Reached target slices.target. Jul 10 00:23:05.124820 systemd[1]: Reached target swap.target. Jul 10 00:23:05.124830 systemd[1]: Reached target torcx.target. Jul 10 00:23:05.124840 systemd[1]: Reached target veritysetup.target. Jul 10 00:23:05.124851 systemd[1]: Listening on systemd-coredump.socket. Jul 10 00:23:05.124863 systemd[1]: Listening on systemd-initctl.socket. Jul 10 00:23:05.124873 systemd[1]: Listening on systemd-networkd.socket. Jul 10 00:23:05.124883 systemd[1]: Listening on systemd-udevd-control.socket. Jul 10 00:23:05.124894 systemd[1]: Listening on systemd-udevd-kernel.socket. Jul 10 00:23:05.124904 systemd[1]: Listening on systemd-userdbd.socket. Jul 10 00:23:05.124915 systemd[1]: Mounting dev-hugepages.mount... Jul 10 00:23:05.124925 systemd[1]: Mounting dev-mqueue.mount... Jul 10 00:23:05.124935 systemd[1]: Mounting media.mount... Jul 10 00:23:05.124945 systemd[1]: Mounting sys-kernel-debug.mount... Jul 10 00:23:05.124956 systemd[1]: Mounting sys-kernel-tracing.mount... Jul 10 00:23:05.124966 systemd[1]: Mounting tmp.mount... Jul 10 00:23:05.124977 systemd[1]: Starting flatcar-tmpfiles.service... Jul 10 00:23:05.124992 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Jul 10 00:23:05.125002 systemd[1]: Starting kmod-static-nodes.service... Jul 10 00:23:05.125013 systemd[1]: Starting modprobe@configfs.service... Jul 10 00:23:05.125023 systemd[1]: Starting modprobe@dm_mod.service... Jul 10 00:23:05.125033 systemd[1]: Starting modprobe@drm.service... Jul 10 00:23:05.125044 systemd[1]: Starting modprobe@efi_pstore.service... Jul 10 00:23:05.125055 systemd[1]: Starting modprobe@fuse.service... Jul 10 00:23:05.125065 systemd[1]: Starting modprobe@loop.service... Jul 10 00:23:05.125076 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Jul 10 00:23:05.125086 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Jul 10 00:23:05.125096 systemd[1]: Stopped systemd-fsck-root.service. Jul 10 00:23:05.125106 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Jul 10 00:23:05.125117 systemd[1]: Stopped systemd-fsck-usr.service. Jul 10 00:23:05.125127 systemd[1]: Stopped systemd-journald.service. Jul 10 00:23:05.125137 kernel: fuse: init (API version 7.34) Jul 10 00:23:05.125149 systemd[1]: Starting systemd-journald.service... Jul 10 00:23:05.125161 kernel: loop: module loaded Jul 10 00:23:05.125171 systemd[1]: Starting systemd-modules-load.service... Jul 10 00:23:05.125183 systemd[1]: Starting systemd-network-generator.service... Jul 10 00:23:05.125194 systemd[1]: Starting systemd-remount-fs.service... Jul 10 00:23:05.125205 systemd[1]: Starting systemd-udev-trigger.service... Jul 10 00:23:05.125215 systemd[1]: verity-setup.service: Deactivated successfully. Jul 10 00:23:05.125225 systemd[1]: Stopped verity-setup.service. Jul 10 00:23:05.125236 systemd[1]: Mounted dev-hugepages.mount. Jul 10 00:23:05.125246 systemd[1]: Mounted dev-mqueue.mount. Jul 10 00:23:05.125256 systemd[1]: Mounted media.mount. Jul 10 00:23:05.125266 systemd[1]: Mounted sys-kernel-debug.mount. Jul 10 00:23:05.125280 systemd[1]: Mounted sys-kernel-tracing.mount. Jul 10 00:23:05.125291 systemd[1]: Mounted tmp.mount. Jul 10 00:23:05.125302 systemd[1]: Finished kmod-static-nodes.service. Jul 10 00:23:05.125312 systemd[1]: modprobe@configfs.service: Deactivated successfully. Jul 10 00:23:05.125322 systemd[1]: Finished modprobe@configfs.service. Jul 10 00:23:05.125333 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Jul 10 00:23:05.125343 systemd[1]: Finished modprobe@dm_mod.service. Jul 10 00:23:05.125353 systemd[1]: modprobe@drm.service: Deactivated successfully. Jul 10 00:23:05.125363 systemd[1]: Finished modprobe@drm.service. Jul 10 00:23:05.125375 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Jul 10 00:23:05.125400 systemd[1]: Finished modprobe@efi_pstore.service. Jul 10 00:23:05.125413 systemd[1]: modprobe@fuse.service: Deactivated successfully. Jul 10 00:23:05.125426 systemd-journald[993]: Journal started Jul 10 00:23:05.125472 systemd-journald[993]: Runtime Journal (/run/log/journal/0395f27e0a814ec18aaf48c1ab178f7c) is 6.0M, max 48.7M, 42.6M free. Jul 10 00:23:03.244000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Jul 10 00:23:03.319000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Jul 10 00:23:03.319000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Jul 10 00:23:03.319000 audit: BPF prog-id=10 op=LOAD Jul 10 00:23:03.319000 audit: BPF prog-id=10 op=UNLOAD Jul 10 00:23:03.320000 audit: BPF prog-id=11 op=LOAD Jul 10 00:23:03.320000 audit: BPF prog-id=11 op=UNLOAD Jul 10 00:23:03.357000 audit[930]: AVC avc: denied { associate } for pid=930 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Jul 10 00:23:03.357000 audit[930]: SYSCALL arch=c00000b7 syscall=5 success=yes exit=0 a0=400018d8cc a1=4000028e40 a2=4000027100 a3=32 items=0 ppid=913 pid=930 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:23:03.357000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Jul 10 00:23:03.357000 audit[930]: AVC avc: denied { associate } for pid=930 comm="torcx-generator" name="bin" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Jul 10 00:23:03.357000 audit[930]: SYSCALL arch=c00000b7 syscall=34 success=yes exit=0 a0=ffffffffffffff9c a1=400018d9a5 a2=1ed a3=0 items=2 ppid=913 pid=930 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:23:03.357000 audit: CWD cwd="/" Jul 10 00:23:03.357000 audit: PATH item=0 name=(null) inode=2 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:23:03.357000 audit: PATH item=1 name=(null) inode=3 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:23:03.357000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Jul 10 00:23:05.009000 audit: BPF prog-id=12 op=LOAD Jul 10 00:23:05.009000 audit: BPF prog-id=3 op=UNLOAD Jul 10 00:23:05.009000 audit: BPF prog-id=13 op=LOAD Jul 10 00:23:05.009000 audit: BPF prog-id=14 op=LOAD Jul 10 00:23:05.009000 audit: BPF prog-id=4 op=UNLOAD Jul 10 00:23:05.009000 audit: BPF prog-id=5 op=UNLOAD Jul 10 00:23:05.010000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:23:05.012000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:23:05.012000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:23:05.024000 audit: BPF prog-id=12 op=UNLOAD Jul 10 00:23:05.086000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:23:05.088000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:23:05.089000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:23:05.089000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:23:05.092000 audit: BPF prog-id=15 op=LOAD Jul 10 00:23:05.092000 audit: BPF prog-id=16 op=LOAD Jul 10 00:23:05.092000 audit: BPF prog-id=17 op=LOAD Jul 10 00:23:05.092000 audit: BPF prog-id=13 op=UNLOAD Jul 10 00:23:05.092000 audit: BPF prog-id=14 op=UNLOAD Jul 10 00:23:05.105000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:23:05.115000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:23:05.117000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:23:05.117000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:23:05.119000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:23:05.119000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:23:05.122000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:23:05.122000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:23:05.122000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Jul 10 00:23:05.122000 audit[993]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=60 a0=3 a1=ffffffd4ce30 a2=4000 a3=1 items=0 ppid=1 pid=993 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:23:05.122000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Jul 10 00:23:05.124000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:23:05.124000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:23:03.355478 /usr/lib/systemd/system-generators/torcx-generator[930]: time="2025-07-10T00:23:03Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" Jul 10 00:23:05.008063 systemd[1]: Queued start job for default target multi-user.target. Jul 10 00:23:03.355746 /usr/lib/systemd/system-generators/torcx-generator[930]: time="2025-07-10T00:23:03Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Jul 10 00:23:05.126749 systemd[1]: Finished modprobe@fuse.service. Jul 10 00:23:05.008075 systemd[1]: Unnecessary job was removed for dev-vda6.device. Jul 10 00:23:05.126000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:23:05.126000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:23:03.355764 /usr/lib/systemd/system-generators/torcx-generator[930]: time="2025-07-10T00:23:03Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Jul 10 00:23:05.010571 systemd[1]: systemd-journald.service: Deactivated successfully. Jul 10 00:23:03.355793 /usr/lib/systemd/system-generators/torcx-generator[930]: time="2025-07-10T00:23:03Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Jul 10 00:23:03.355803 /usr/lib/systemd/system-generators/torcx-generator[930]: time="2025-07-10T00:23:03Z" level=debug msg="skipped missing lower profile" missing profile=oem Jul 10 00:23:05.127415 systemd[1]: Started systemd-journald.service. Jul 10 00:23:03.355829 /usr/lib/systemd/system-generators/torcx-generator[930]: time="2025-07-10T00:23:03Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Jul 10 00:23:03.355840 /usr/lib/systemd/system-generators/torcx-generator[930]: time="2025-07-10T00:23:03Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Jul 10 00:23:03.356022 /usr/lib/systemd/system-generators/torcx-generator[930]: time="2025-07-10T00:23:03Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Jul 10 00:23:05.127000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:23:03.356058 /usr/lib/systemd/system-generators/torcx-generator[930]: time="2025-07-10T00:23:03Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Jul 10 00:23:03.356069 /usr/lib/systemd/system-generators/torcx-generator[930]: time="2025-07-10T00:23:03Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Jul 10 00:23:03.356836 /usr/lib/systemd/system-generators/torcx-generator[930]: time="2025-07-10T00:23:03Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Jul 10 00:23:03.356870 /usr/lib/systemd/system-generators/torcx-generator[930]: time="2025-07-10T00:23:03Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Jul 10 00:23:03.356888 /usr/lib/systemd/system-generators/torcx-generator[930]: time="2025-07-10T00:23:03Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.7: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.7 Jul 10 00:23:05.128362 systemd[1]: modprobe@loop.service: Deactivated successfully. Jul 10 00:23:03.356902 /usr/lib/systemd/system-generators/torcx-generator[930]: time="2025-07-10T00:23:03Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Jul 10 00:23:05.128624 systemd[1]: Finished modprobe@loop.service. Jul 10 00:23:03.356919 /usr/lib/systemd/system-generators/torcx-generator[930]: time="2025-07-10T00:23:03Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.7: no such file or directory" path=/var/lib/torcx/store/3510.3.7 Jul 10 00:23:03.356932 /usr/lib/systemd/system-generators/torcx-generator[930]: time="2025-07-10T00:23:03Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Jul 10 00:23:04.772851 /usr/lib/systemd/system-generators/torcx-generator[930]: time="2025-07-10T00:23:04Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Jul 10 00:23:04.773098 /usr/lib/systemd/system-generators/torcx-generator[930]: time="2025-07-10T00:23:04Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Jul 10 00:23:05.128000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:23:05.128000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:23:04.773192 /usr/lib/systemd/system-generators/torcx-generator[930]: time="2025-07-10T00:23:04Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Jul 10 00:23:04.773347 /usr/lib/systemd/system-generators/torcx-generator[930]: time="2025-07-10T00:23:04Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Jul 10 00:23:04.773412 /usr/lib/systemd/system-generators/torcx-generator[930]: time="2025-07-10T00:23:04Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Jul 10 00:23:04.773473 /usr/lib/systemd/system-generators/torcx-generator[930]: time="2025-07-10T00:23:04Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Jul 10 00:23:05.129731 systemd[1]: Finished systemd-modules-load.service. Jul 10 00:23:05.129000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:23:05.131017 systemd[1]: Finished systemd-network-generator.service. Jul 10 00:23:05.131000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:23:05.132007 systemd[1]: Finished systemd-remount-fs.service. Jul 10 00:23:05.132000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:23:05.133180 systemd[1]: Reached target network-pre.target. Jul 10 00:23:05.134995 systemd[1]: Mounting sys-fs-fuse-connections.mount... Jul 10 00:23:05.136648 systemd[1]: Mounting sys-kernel-config.mount... Jul 10 00:23:05.137212 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Jul 10 00:23:05.138567 systemd[1]: Starting systemd-hwdb-update.service... Jul 10 00:23:05.140325 systemd[1]: Starting systemd-journal-flush.service... Jul 10 00:23:05.141147 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Jul 10 00:23:05.142099 systemd[1]: Starting systemd-random-seed.service... Jul 10 00:23:05.143248 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Jul 10 00:23:05.149945 systemd-journald[993]: Time spent on flushing to /var/log/journal/0395f27e0a814ec18aaf48c1ab178f7c is 24.388ms for 969 entries. Jul 10 00:23:05.149945 systemd-journald[993]: System Journal (/var/log/journal/0395f27e0a814ec18aaf48c1ab178f7c) is 8.0M, max 195.6M, 187.6M free. Jul 10 00:23:05.183705 systemd-journald[993]: Received client request to flush runtime journal. Jul 10 00:23:05.152000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:23:05.153000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:23:05.160000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:23:05.166000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:23:05.173000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:23:05.144347 systemd[1]: Starting systemd-sysctl.service... Jul 10 00:23:05.146226 systemd[1]: Mounted sys-fs-fuse-connections.mount. Jul 10 00:23:05.147003 systemd[1]: Mounted sys-kernel-config.mount. Jul 10 00:23:05.184535 udevadm[1032]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation.service, lvm2-activation-early.service not to pull it in. Jul 10 00:23:05.151792 systemd[1]: Finished flatcar-tmpfiles.service. Jul 10 00:23:05.152892 systemd[1]: Finished systemd-random-seed.service. Jul 10 00:23:05.153782 systemd[1]: Reached target first-boot-complete.target. Jul 10 00:23:05.155426 systemd[1]: Starting systemd-sysusers.service... Jul 10 00:23:05.160585 systemd[1]: Finished systemd-udev-trigger.service. Jul 10 00:23:05.162336 systemd[1]: Starting systemd-udev-settle.service... Jul 10 00:23:05.165792 systemd[1]: Finished systemd-sysctl.service. Jul 10 00:23:05.172914 systemd[1]: Finished systemd-sysusers.service. Jul 10 00:23:05.174486 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Jul 10 00:23:05.184671 systemd[1]: Finished systemd-journal-flush.service. Jul 10 00:23:05.184000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:23:05.193644 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Jul 10 00:23:05.193000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:23:05.520497 systemd[1]: Finished systemd-hwdb-update.service. Jul 10 00:23:05.520000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:23:05.521000 audit: BPF prog-id=18 op=LOAD Jul 10 00:23:05.521000 audit: BPF prog-id=19 op=LOAD Jul 10 00:23:05.521000 audit: BPF prog-id=7 op=UNLOAD Jul 10 00:23:05.521000 audit: BPF prog-id=8 op=UNLOAD Jul 10 00:23:05.522472 systemd[1]: Starting systemd-udevd.service... Jul 10 00:23:05.540593 systemd-udevd[1036]: Using default interface naming scheme 'v252'. Jul 10 00:23:05.553000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:23:05.554000 audit: BPF prog-id=20 op=LOAD Jul 10 00:23:05.553478 systemd[1]: Started systemd-udevd.service. Jul 10 00:23:05.555662 systemd[1]: Starting systemd-networkd.service... Jul 10 00:23:05.563000 audit: BPF prog-id=21 op=LOAD Jul 10 00:23:05.563000 audit: BPF prog-id=22 op=LOAD Jul 10 00:23:05.563000 audit: BPF prog-id=23 op=LOAD Jul 10 00:23:05.564535 systemd[1]: Starting systemd-userdbd.service... Jul 10 00:23:05.589253 systemd[1]: Condition check resulted in dev-ttyAMA0.device being skipped. Jul 10 00:23:05.596000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:23:05.595726 systemd[1]: Started systemd-userdbd.service. Jul 10 00:23:05.610045 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Jul 10 00:23:05.646989 systemd-networkd[1044]: lo: Link UP Jul 10 00:23:05.647268 systemd-networkd[1044]: lo: Gained carrier Jul 10 00:23:05.647817 systemd-networkd[1044]: Enumeration completed Jul 10 00:23:05.648000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:23:05.647974 systemd[1]: Started systemd-networkd.service. Jul 10 00:23:05.648806 systemd-networkd[1044]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Jul 10 00:23:05.651658 systemd-networkd[1044]: eth0: Link UP Jul 10 00:23:05.651669 systemd-networkd[1044]: eth0: Gained carrier Jul 10 00:23:05.659836 systemd[1]: Finished systemd-udev-settle.service. Jul 10 00:23:05.660000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:23:05.661730 systemd[1]: Starting lvm2-activation-early.service... Jul 10 00:23:05.668540 systemd-networkd[1044]: eth0: DHCPv4 address 10.0.0.22/16, gateway 10.0.0.1 acquired from 10.0.0.1 Jul 10 00:23:05.673454 lvm[1069]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Jul 10 00:23:05.699452 systemd[1]: Finished lvm2-activation-early.service. Jul 10 00:23:05.699000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:23:05.700258 systemd[1]: Reached target cryptsetup.target. Jul 10 00:23:05.702062 systemd[1]: Starting lvm2-activation.service... Jul 10 00:23:05.705771 lvm[1070]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Jul 10 00:23:05.737341 systemd[1]: Finished lvm2-activation.service. Jul 10 00:23:05.737000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:23:05.738162 systemd[1]: Reached target local-fs-pre.target. Jul 10 00:23:05.738843 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Jul 10 00:23:05.738876 systemd[1]: Reached target local-fs.target. Jul 10 00:23:05.739461 systemd[1]: Reached target machines.target. Jul 10 00:23:05.741252 systemd[1]: Starting ldconfig.service... Jul 10 00:23:05.742154 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Jul 10 00:23:05.742208 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Jul 10 00:23:05.743475 systemd[1]: Starting systemd-boot-update.service... Jul 10 00:23:05.745325 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Jul 10 00:23:05.747482 systemd[1]: Starting systemd-machine-id-commit.service... Jul 10 00:23:05.749644 systemd[1]: Starting systemd-sysext.service... Jul 10 00:23:05.750589 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1072 (bootctl) Jul 10 00:23:05.752005 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Jul 10 00:23:05.756954 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Jul 10 00:23:05.758000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:23:05.763297 systemd[1]: Unmounting usr-share-oem.mount... Jul 10 00:23:05.770628 systemd[1]: usr-share-oem.mount: Deactivated successfully. Jul 10 00:23:05.770835 systemd[1]: Unmounted usr-share-oem.mount. Jul 10 00:23:05.790418 kernel: loop0: detected capacity change from 0 to 207008 Jul 10 00:23:05.834147 systemd[1]: Finished systemd-machine-id-commit.service. Jul 10 00:23:05.834000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:23:05.838597 systemd-fsck[1082]: fsck.fat 4.2 (2021-01-31) Jul 10 00:23:05.838597 systemd-fsck[1082]: /dev/vda1: 236 files, 117310/258078 clusters Jul 10 00:23:05.840775 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Jul 10 00:23:05.841000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:23:05.848417 kernel: squashfs: version 4.0 (2009/01/31) Phillip Lougher Jul 10 00:23:05.868406 kernel: loop1: detected capacity change from 0 to 207008 Jul 10 00:23:05.873706 (sd-sysext)[1086]: Using extensions 'kubernetes'. Jul 10 00:23:05.874207 (sd-sysext)[1086]: Merged extensions into '/usr'. Jul 10 00:23:05.891326 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Jul 10 00:23:05.892554 systemd[1]: Starting modprobe@dm_mod.service... Jul 10 00:23:05.894359 systemd[1]: Starting modprobe@efi_pstore.service... Jul 10 00:23:05.896168 systemd[1]: Starting modprobe@loop.service... Jul 10 00:23:05.896855 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Jul 10 00:23:05.896975 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Jul 10 00:23:05.897730 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Jul 10 00:23:05.897852 systemd[1]: Finished modprobe@dm_mod.service. Jul 10 00:23:05.898000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:23:05.898000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:23:05.898986 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Jul 10 00:23:05.899106 systemd[1]: Finished modprobe@efi_pstore.service. Jul 10 00:23:05.899000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:23:05.899000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:23:05.900325 systemd[1]: modprobe@loop.service: Deactivated successfully. Jul 10 00:23:05.900536 systemd[1]: Finished modprobe@loop.service. Jul 10 00:23:05.901000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:23:05.901000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:23:05.901897 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Jul 10 00:23:05.901992 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Jul 10 00:23:05.924266 ldconfig[1071]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Jul 10 00:23:05.927803 systemd[1]: Finished ldconfig.service. Jul 10 00:23:05.928000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ldconfig comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:23:06.107518 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Jul 10 00:23:06.109304 systemd[1]: Mounting boot.mount... Jul 10 00:23:06.110970 systemd[1]: Mounting usr-share-oem.mount... Jul 10 00:23:06.115842 systemd[1]: Mounted usr-share-oem.mount. Jul 10 00:23:06.117721 systemd[1]: Finished systemd-sysext.service. Jul 10 00:23:06.117000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:23:06.119539 systemd[1]: Mounted boot.mount. Jul 10 00:23:06.121132 systemd[1]: Starting ensure-sysext.service... Jul 10 00:23:06.122846 systemd[1]: Starting systemd-tmpfiles-setup.service... Jul 10 00:23:06.127289 systemd[1]: Reloading. Jul 10 00:23:06.132010 systemd-tmpfiles[1094]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Jul 10 00:23:06.133380 systemd-tmpfiles[1094]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Jul 10 00:23:06.134838 systemd-tmpfiles[1094]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Jul 10 00:23:06.173149 /usr/lib/systemd/system-generators/torcx-generator[1114]: time="2025-07-10T00:23:06Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" Jul 10 00:23:06.173182 /usr/lib/systemd/system-generators/torcx-generator[1114]: time="2025-07-10T00:23:06Z" level=info msg="torcx already run" Jul 10 00:23:06.232482 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Jul 10 00:23:06.232499 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Jul 10 00:23:06.248234 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Jul 10 00:23:06.290000 audit: BPF prog-id=24 op=LOAD Jul 10 00:23:06.290000 audit: BPF prog-id=20 op=UNLOAD Jul 10 00:23:06.291000 audit: BPF prog-id=25 op=LOAD Jul 10 00:23:06.291000 audit: BPF prog-id=21 op=UNLOAD Jul 10 00:23:06.291000 audit: BPF prog-id=26 op=LOAD Jul 10 00:23:06.291000 audit: BPF prog-id=27 op=LOAD Jul 10 00:23:06.291000 audit: BPF prog-id=22 op=UNLOAD Jul 10 00:23:06.291000 audit: BPF prog-id=23 op=UNLOAD Jul 10 00:23:06.291000 audit: BPF prog-id=28 op=LOAD Jul 10 00:23:06.291000 audit: BPF prog-id=15 op=UNLOAD Jul 10 00:23:06.291000 audit: BPF prog-id=29 op=LOAD Jul 10 00:23:06.292000 audit: BPF prog-id=30 op=LOAD Jul 10 00:23:06.292000 audit: BPF prog-id=16 op=UNLOAD Jul 10 00:23:06.292000 audit: BPF prog-id=17 op=UNLOAD Jul 10 00:23:06.292000 audit: BPF prog-id=31 op=LOAD Jul 10 00:23:06.292000 audit: BPF prog-id=32 op=LOAD Jul 10 00:23:06.292000 audit: BPF prog-id=18 op=UNLOAD Jul 10 00:23:06.292000 audit: BPF prog-id=19 op=UNLOAD Jul 10 00:23:06.295473 systemd[1]: Finished systemd-boot-update.service. Jul 10 00:23:06.295000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:23:06.297261 systemd[1]: Finished systemd-tmpfiles-setup.service. Jul 10 00:23:06.297000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:23:06.300369 systemd[1]: Starting audit-rules.service... Jul 10 00:23:06.301992 systemd[1]: Starting clean-ca-certificates.service... Jul 10 00:23:06.303799 systemd[1]: Starting systemd-journal-catalog-update.service... Jul 10 00:23:06.304000 audit: BPF prog-id=33 op=LOAD Jul 10 00:23:06.306131 systemd[1]: Starting systemd-resolved.service... Jul 10 00:23:06.307000 audit: BPF prog-id=34 op=LOAD Jul 10 00:23:06.308907 systemd[1]: Starting systemd-timesyncd.service... Jul 10 00:23:06.310899 systemd[1]: Starting systemd-update-utmp.service... Jul 10 00:23:06.315000 audit[1159]: SYSTEM_BOOT pid=1159 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Jul 10 00:23:06.316208 systemd[1]: Finished clean-ca-certificates.service. Jul 10 00:23:06.316000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:23:06.320212 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Jul 10 00:23:06.321590 systemd[1]: Starting modprobe@dm_mod.service... Jul 10 00:23:06.323656 systemd[1]: Starting modprobe@efi_pstore.service... Jul 10 00:23:06.325469 systemd[1]: Starting modprobe@loop.service... Jul 10 00:23:06.326234 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Jul 10 00:23:06.326457 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Jul 10 00:23:06.326609 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Jul 10 00:23:06.327907 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Jul 10 00:23:06.328044 systemd[1]: Finished modprobe@dm_mod.service. Jul 10 00:23:06.328000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:23:06.328000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:23:06.329457 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Jul 10 00:23:06.329563 systemd[1]: Finished modprobe@efi_pstore.service. Jul 10 00:23:06.330000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:23:06.330000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:23:06.330815 systemd[1]: modprobe@loop.service: Deactivated successfully. Jul 10 00:23:06.330916 systemd[1]: Finished modprobe@loop.service. Jul 10 00:23:06.331000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:23:06.331000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:23:06.332162 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Jul 10 00:23:06.332271 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Jul 10 00:23:06.333510 systemd[1]: Finished systemd-update-utmp.service. Jul 10 00:23:06.333000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:23:06.335816 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Jul 10 00:23:06.337239 systemd[1]: Starting modprobe@dm_mod.service... Jul 10 00:23:06.339126 systemd[1]: Starting modprobe@efi_pstore.service... Jul 10 00:23:06.342000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:23:06.340860 systemd[1]: Starting modprobe@loop.service... Jul 10 00:23:06.341432 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Jul 10 00:23:06.341559 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Jul 10 00:23:06.341657 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Jul 10 00:23:06.342536 systemd[1]: Finished systemd-journal-catalog-update.service. Jul 10 00:23:06.343699 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Jul 10 00:23:06.343799 systemd[1]: Finished modprobe@dm_mod.service. Jul 10 00:23:06.344000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:23:06.344000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:23:06.344792 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Jul 10 00:23:06.344935 systemd[1]: Finished modprobe@efi_pstore.service. Jul 10 00:23:06.345000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:23:06.345000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:23:06.346070 systemd[1]: modprobe@loop.service: Deactivated successfully. Jul 10 00:23:06.346170 systemd[1]: Finished modprobe@loop.service. Jul 10 00:23:06.346000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:23:06.346000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:23:06.347144 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Jul 10 00:23:06.347227 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Jul 10 00:23:06.348551 systemd[1]: Starting systemd-update-done.service... Jul 10 00:23:06.351877 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Jul 10 00:23:06.353057 systemd[1]: Starting modprobe@dm_mod.service... Jul 10 00:23:06.354884 systemd[1]: Starting modprobe@drm.service... Jul 10 00:23:06.356974 systemd[1]: Starting modprobe@efi_pstore.service... Jul 10 00:23:06.358590 systemd[1]: Starting modprobe@loop.service... Jul 10 00:23:06.359185 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Jul 10 00:23:06.359306 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Jul 10 00:23:06.360565 systemd[1]: Starting systemd-networkd-wait-online.service... Jul 10 00:23:06.361369 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Jul 10 00:23:06.362915 systemd[1]: Finished systemd-update-done.service. Jul 10 00:23:06.363000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-done comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:23:06.364024 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Jul 10 00:23:06.364158 systemd[1]: Finished modprobe@dm_mod.service. Jul 10 00:23:06.365000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:23:06.365000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:23:06.365792 systemd[1]: modprobe@drm.service: Deactivated successfully. Jul 10 00:23:06.365897 systemd[1]: Finished modprobe@drm.service. Jul 10 00:23:06.368000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:23:06.368000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:23:06.368968 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Jul 10 00:23:06.369099 systemd[1]: Finished modprobe@efi_pstore.service. Jul 10 00:23:06.369000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:23:06.369000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:23:06.370304 systemd[1]: modprobe@loop.service: Deactivated successfully. Jul 10 00:23:06.370459 systemd[1]: Finished modprobe@loop.service. Jul 10 00:23:06.370000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:23:06.370000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:23:06.371408 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Jul 10 00:23:06.371521 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Jul 10 00:23:06.373043 systemd[1]: Finished ensure-sysext.service. Jul 10 00:23:06.373000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ensure-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:23:06.373000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Jul 10 00:23:06.373000 audit[1184]: SYSCALL arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=ffffeb31d560 a2=420 a3=0 items=0 ppid=1153 pid=1184 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:23:06.373000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Jul 10 00:23:06.374117 augenrules[1184]: No rules Jul 10 00:23:06.374850 systemd[1]: Finished audit-rules.service. Jul 10 00:23:06.385248 systemd[1]: Started systemd-timesyncd.service. Jul 10 00:23:06.851402 systemd-timesyncd[1158]: Contacted time server 10.0.0.1:123 (10.0.0.1). Jul 10 00:23:06.851481 systemd-timesyncd[1158]: Initial clock synchronization to Thu 2025-07-10 00:23:06.851319 UTC. Jul 10 00:23:06.851523 systemd[1]: Reached target time-set.target. Jul 10 00:23:06.855332 systemd-resolved[1157]: Positive Trust Anchors: Jul 10 00:23:06.855602 systemd-resolved[1157]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Jul 10 00:23:06.855674 systemd-resolved[1157]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Jul 10 00:23:06.866217 systemd-resolved[1157]: Defaulting to hostname 'linux'. Jul 10 00:23:06.869577 systemd[1]: Started systemd-resolved.service. Jul 10 00:23:06.870233 systemd[1]: Reached target network.target. Jul 10 00:23:06.870819 systemd[1]: Reached target nss-lookup.target. Jul 10 00:23:06.871375 systemd[1]: Reached target sysinit.target. Jul 10 00:23:06.872042 systemd[1]: Started motdgen.path. Jul 10 00:23:06.872573 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Jul 10 00:23:06.873510 systemd[1]: Started logrotate.timer. Jul 10 00:23:06.874132 systemd[1]: Started mdadm.timer. Jul 10 00:23:06.874640 systemd[1]: Started systemd-tmpfiles-clean.timer. Jul 10 00:23:06.875231 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Jul 10 00:23:06.875259 systemd[1]: Reached target paths.target. Jul 10 00:23:06.875809 systemd[1]: Reached target timers.target. Jul 10 00:23:06.876650 systemd[1]: Listening on dbus.socket. Jul 10 00:23:06.878231 systemd[1]: Starting docker.socket... Jul 10 00:23:06.881210 systemd[1]: Listening on sshd.socket. Jul 10 00:23:06.881889 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Jul 10 00:23:06.882322 systemd[1]: Listening on docker.socket. Jul 10 00:23:06.882980 systemd[1]: Reached target sockets.target. Jul 10 00:23:06.883544 systemd[1]: Reached target basic.target. Jul 10 00:23:06.884105 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Jul 10 00:23:06.884136 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Jul 10 00:23:06.885100 systemd[1]: Starting containerd.service... Jul 10 00:23:06.886608 systemd[1]: Starting dbus.service... Jul 10 00:23:06.888202 systemd[1]: Starting enable-oem-cloudinit.service... Jul 10 00:23:06.890060 systemd[1]: Starting extend-filesystems.service... Jul 10 00:23:06.890736 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Jul 10 00:23:06.892051 systemd[1]: Starting motdgen.service... Jul 10 00:23:06.893741 systemd[1]: Starting ssh-key-proc-cmdline.service... Jul 10 00:23:06.896125 systemd[1]: Starting sshd-keygen.service... Jul 10 00:23:06.899911 systemd[1]: Starting systemd-logind.service... Jul 10 00:23:06.907094 jq[1196]: false Jul 10 00:23:06.900504 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Jul 10 00:23:06.900579 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). Jul 10 00:23:06.901017 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Jul 10 00:23:06.914028 jq[1210]: true Jul 10 00:23:06.901623 systemd[1]: Starting update-engine.service... Jul 10 00:23:06.904312 systemd[1]: Starting update-ssh-keys-after-ignition.service... Jul 10 00:23:06.906646 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Jul 10 00:23:06.907805 systemd[1]: Finished ssh-key-proc-cmdline.service. Jul 10 00:23:06.908758 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Jul 10 00:23:06.910277 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Jul 10 00:23:06.912283 systemd[1]: motdgen.service: Deactivated successfully. Jul 10 00:23:06.912438 systemd[1]: Finished motdgen.service. Jul 10 00:23:06.915795 extend-filesystems[1197]: Found loop1 Jul 10 00:23:06.915795 extend-filesystems[1197]: Found vda Jul 10 00:23:06.915795 extend-filesystems[1197]: Found vda1 Jul 10 00:23:06.915795 extend-filesystems[1197]: Found vda2 Jul 10 00:23:06.915795 extend-filesystems[1197]: Found vda3 Jul 10 00:23:06.915795 extend-filesystems[1197]: Found usr Jul 10 00:23:06.915795 extend-filesystems[1197]: Found vda4 Jul 10 00:23:06.915795 extend-filesystems[1197]: Found vda6 Jul 10 00:23:06.915795 extend-filesystems[1197]: Found vda7 Jul 10 00:23:06.915795 extend-filesystems[1197]: Found vda9 Jul 10 00:23:06.915795 extend-filesystems[1197]: Checking size of /dev/vda9 Jul 10 00:23:06.927333 jq[1216]: true Jul 10 00:23:06.929293 extend-filesystems[1197]: Resized partition /dev/vda9 Jul 10 00:23:06.930592 dbus-daemon[1195]: [system] SELinux support is enabled Jul 10 00:23:06.930770 systemd[1]: Started dbus.service. Jul 10 00:23:06.933295 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Jul 10 00:23:06.933320 systemd[1]: Reached target system-config.target. Jul 10 00:23:06.934005 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Jul 10 00:23:06.934018 systemd[1]: Reached target user-config.target. Jul 10 00:23:06.955463 extend-filesystems[1227]: resize2fs 1.46.5 (30-Dec-2021) Jul 10 00:23:06.968462 kernel: EXT4-fs (vda9): resizing filesystem from 553472 to 1864699 blocks Jul 10 00:23:06.976276 systemd-logind[1206]: Watching system buttons on /dev/input/event0 (Power Button) Jul 10 00:23:06.978628 systemd-logind[1206]: New seat seat0. Jul 10 00:23:06.982494 systemd[1]: Started systemd-logind.service. Jul 10 00:23:07.003156 update_engine[1208]: I0710 00:23:07.000437 1208 main.cc:92] Flatcar Update Engine starting Jul 10 00:23:07.005465 kernel: EXT4-fs (vda9): resized filesystem to 1864699 Jul 10 00:23:07.009460 systemd[1]: Started update-engine.service. Jul 10 00:23:07.021664 extend-filesystems[1227]: Filesystem at /dev/vda9 is mounted on /; on-line resizing required Jul 10 00:23:07.021664 extend-filesystems[1227]: old_desc_blocks = 1, new_desc_blocks = 1 Jul 10 00:23:07.021664 extend-filesystems[1227]: The filesystem on /dev/vda9 is now 1864699 (4k) blocks long. Jul 10 00:23:07.024969 update_engine[1208]: I0710 00:23:07.009554 1208 update_check_scheduler.cc:74] Next update check in 6m29s Jul 10 00:23:07.013070 systemd[1]: Started locksmithd.service. Jul 10 00:23:07.025096 extend-filesystems[1197]: Resized filesystem in /dev/vda9 Jul 10 00:23:07.026379 bash[1243]: Updated "/home/core/.ssh/authorized_keys" Jul 10 00:23:07.024735 systemd[1]: extend-filesystems.service: Deactivated successfully. Jul 10 00:23:07.026608 env[1217]: time="2025-07-10T00:23:07.025203166Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Jul 10 00:23:07.024906 systemd[1]: Finished extend-filesystems.service. Jul 10 00:23:07.025906 systemd[1]: Finished update-ssh-keys-after-ignition.service. Jul 10 00:23:07.048257 env[1217]: time="2025-07-10T00:23:07.048211846Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Jul 10 00:23:07.048514 env[1217]: time="2025-07-10T00:23:07.048497286Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Jul 10 00:23:07.049706 env[1217]: time="2025-07-10T00:23:07.049670846Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.186-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Jul 10 00:23:07.049706 env[1217]: time="2025-07-10T00:23:07.049703846Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Jul 10 00:23:07.049925 env[1217]: time="2025-07-10T00:23:07.049904606Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Jul 10 00:23:07.049956 env[1217]: time="2025-07-10T00:23:07.049924686Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Jul 10 00:23:07.049956 env[1217]: time="2025-07-10T00:23:07.049938846Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Jul 10 00:23:07.049956 env[1217]: time="2025-07-10T00:23:07.049948526Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Jul 10 00:23:07.050024 env[1217]: time="2025-07-10T00:23:07.050016526Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Jul 10 00:23:07.050339 env[1217]: time="2025-07-10T00:23:07.050295686Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Jul 10 00:23:07.050436 env[1217]: time="2025-07-10T00:23:07.050416566Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Jul 10 00:23:07.050475 env[1217]: time="2025-07-10T00:23:07.050437126Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Jul 10 00:23:07.050569 env[1217]: time="2025-07-10T00:23:07.050549326Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Jul 10 00:23:07.050599 env[1217]: time="2025-07-10T00:23:07.050571286Z" level=info msg="metadata content store policy set" policy=shared Jul 10 00:23:07.054006 env[1217]: time="2025-07-10T00:23:07.053981966Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Jul 10 00:23:07.054081 env[1217]: time="2025-07-10T00:23:07.054011446Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Jul 10 00:23:07.054081 env[1217]: time="2025-07-10T00:23:07.054024806Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Jul 10 00:23:07.054081 env[1217]: time="2025-07-10T00:23:07.054061286Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Jul 10 00:23:07.054081 env[1217]: time="2025-07-10T00:23:07.054076486Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Jul 10 00:23:07.054171 env[1217]: time="2025-07-10T00:23:07.054090526Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Jul 10 00:23:07.054171 env[1217]: time="2025-07-10T00:23:07.054103206Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Jul 10 00:23:07.054511 env[1217]: time="2025-07-10T00:23:07.054494366Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Jul 10 00:23:07.054539 env[1217]: time="2025-07-10T00:23:07.054516446Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Jul 10 00:23:07.054539 env[1217]: time="2025-07-10T00:23:07.054529126Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Jul 10 00:23:07.054576 env[1217]: time="2025-07-10T00:23:07.054542406Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Jul 10 00:23:07.054576 env[1217]: time="2025-07-10T00:23:07.054554926Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Jul 10 00:23:07.054674 env[1217]: time="2025-07-10T00:23:07.054658006Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Jul 10 00:23:07.054761 env[1217]: time="2025-07-10T00:23:07.054746246Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Jul 10 00:23:07.054974 env[1217]: time="2025-07-10T00:23:07.054959006Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Jul 10 00:23:07.055002 env[1217]: time="2025-07-10T00:23:07.054985846Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Jul 10 00:23:07.055002 env[1217]: time="2025-07-10T00:23:07.054998366Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Jul 10 00:23:07.055127 env[1217]: time="2025-07-10T00:23:07.055114646Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Jul 10 00:23:07.055159 env[1217]: time="2025-07-10T00:23:07.055132966Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Jul 10 00:23:07.055159 env[1217]: time="2025-07-10T00:23:07.055144726Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Jul 10 00:23:07.055159 env[1217]: time="2025-07-10T00:23:07.055155326Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Jul 10 00:23:07.055219 env[1217]: time="2025-07-10T00:23:07.055167406Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Jul 10 00:23:07.055219 env[1217]: time="2025-07-10T00:23:07.055179246Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Jul 10 00:23:07.055219 env[1217]: time="2025-07-10T00:23:07.055189766Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Jul 10 00:23:07.055219 env[1217]: time="2025-07-10T00:23:07.055200006Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Jul 10 00:23:07.055219 env[1217]: time="2025-07-10T00:23:07.055212726Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Jul 10 00:23:07.055375 env[1217]: time="2025-07-10T00:23:07.055319686Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Jul 10 00:23:07.055375 env[1217]: time="2025-07-10T00:23:07.055364806Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Jul 10 00:23:07.055431 env[1217]: time="2025-07-10T00:23:07.055377206Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Jul 10 00:23:07.055431 env[1217]: time="2025-07-10T00:23:07.055389046Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Jul 10 00:23:07.055431 env[1217]: time="2025-07-10T00:23:07.055401286Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Jul 10 00:23:07.055431 env[1217]: time="2025-07-10T00:23:07.055411726Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Jul 10 00:23:07.055431 env[1217]: time="2025-07-10T00:23:07.055428486Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Jul 10 00:23:07.055568 env[1217]: time="2025-07-10T00:23:07.055490246Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Jul 10 00:23:07.055727 env[1217]: time="2025-07-10T00:23:07.055670766Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Jul 10 00:23:07.056254 env[1217]: time="2025-07-10T00:23:07.055737966Z" level=info msg="Connect containerd service" Jul 10 00:23:07.056254 env[1217]: time="2025-07-10T00:23:07.055767766Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Jul 10 00:23:07.056401 env[1217]: time="2025-07-10T00:23:07.056374806Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Jul 10 00:23:07.056571 env[1217]: time="2025-07-10T00:23:07.056542886Z" level=info msg="Start subscribing containerd event" Jul 10 00:23:07.056614 env[1217]: time="2025-07-10T00:23:07.056583806Z" level=info msg="Start recovering state" Jul 10 00:23:07.056652 env[1217]: time="2025-07-10T00:23:07.056638006Z" level=info msg="Start event monitor" Jul 10 00:23:07.056681 env[1217]: time="2025-07-10T00:23:07.056658646Z" level=info msg="Start snapshots syncer" Jul 10 00:23:07.056681 env[1217]: time="2025-07-10T00:23:07.056668286Z" level=info msg="Start cni network conf syncer for default" Jul 10 00:23:07.056681 env[1217]: time="2025-07-10T00:23:07.056675166Z" level=info msg="Start streaming server" Jul 10 00:23:07.057018 env[1217]: time="2025-07-10T00:23:07.056979446Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Jul 10 00:23:07.057067 env[1217]: time="2025-07-10T00:23:07.057033406Z" level=info msg=serving... address=/run/containerd/containerd.sock Jul 10 00:23:07.057188 systemd[1]: Started containerd.service. Jul 10 00:23:07.058189 env[1217]: time="2025-07-10T00:23:07.058119366Z" level=info msg="containerd successfully booted in 0.048970s" Jul 10 00:23:07.059290 locksmithd[1244]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Jul 10 00:23:07.819658 systemd-networkd[1044]: eth0: Gained IPv6LL Jul 10 00:23:07.821322 systemd[1]: Finished systemd-networkd-wait-online.service. Jul 10 00:23:07.822345 systemd[1]: Reached target network-online.target. Jul 10 00:23:07.824520 systemd[1]: Starting kubelet.service... Jul 10 00:23:08.426539 systemd[1]: Started kubelet.service. Jul 10 00:23:08.863962 kubelet[1259]: E0710 00:23:08.863858 1259 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Jul 10 00:23:08.865713 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Jul 10 00:23:08.865847 systemd[1]: kubelet.service: Failed with result 'exit-code'. Jul 10 00:23:09.136659 sshd_keygen[1215]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Jul 10 00:23:09.153950 systemd[1]: Finished sshd-keygen.service. Jul 10 00:23:09.155972 systemd[1]: Starting issuegen.service... Jul 10 00:23:09.160235 systemd[1]: issuegen.service: Deactivated successfully. Jul 10 00:23:09.160377 systemd[1]: Finished issuegen.service. Jul 10 00:23:09.162379 systemd[1]: Starting systemd-user-sessions.service... Jul 10 00:23:09.169628 systemd[1]: Finished systemd-user-sessions.service. Jul 10 00:23:09.171498 systemd[1]: Started getty@tty1.service. Jul 10 00:23:09.173264 systemd[1]: Started serial-getty@ttyAMA0.service. Jul 10 00:23:09.174298 systemd[1]: Reached target getty.target. Jul 10 00:23:09.175141 systemd[1]: Reached target multi-user.target. Jul 10 00:23:09.177119 systemd[1]: Starting systemd-update-utmp-runlevel.service... Jul 10 00:23:09.183553 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Jul 10 00:23:09.183706 systemd[1]: Finished systemd-update-utmp-runlevel.service. Jul 10 00:23:09.184529 systemd[1]: Startup finished in 605ms (kernel) + 4.624s (initrd) + 5.510s (userspace) = 10.740s. Jul 10 00:23:11.445214 systemd[1]: Created slice system-sshd.slice. Jul 10 00:23:11.446466 systemd[1]: Started sshd@0-10.0.0.22:22-10.0.0.1:40276.service. Jul 10 00:23:11.491534 sshd[1281]: Accepted publickey for core from 10.0.0.1 port 40276 ssh2: RSA SHA256:qOVwIcEhxIMbnnVzVACNg4ZPFMKwsyA0M9qFZXlj7es Jul 10 00:23:11.493816 sshd[1281]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 10 00:23:11.502624 systemd-logind[1206]: New session 1 of user core. Jul 10 00:23:11.503482 systemd[1]: Created slice user-500.slice. Jul 10 00:23:11.504547 systemd[1]: Starting user-runtime-dir@500.service... Jul 10 00:23:11.512315 systemd[1]: Finished user-runtime-dir@500.service. Jul 10 00:23:11.513555 systemd[1]: Starting user@500.service... Jul 10 00:23:11.516366 (systemd)[1284]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Jul 10 00:23:11.587022 systemd[1284]: Queued start job for default target default.target. Jul 10 00:23:11.587549 systemd[1284]: Reached target paths.target. Jul 10 00:23:11.587582 systemd[1284]: Reached target sockets.target. Jul 10 00:23:11.587594 systemd[1284]: Reached target timers.target. Jul 10 00:23:11.587604 systemd[1284]: Reached target basic.target. Jul 10 00:23:11.587644 systemd[1284]: Reached target default.target. Jul 10 00:23:11.587668 systemd[1284]: Startup finished in 66ms. Jul 10 00:23:11.587879 systemd[1]: Started user@500.service. Jul 10 00:23:11.588872 systemd[1]: Started session-1.scope. Jul 10 00:23:11.639788 systemd[1]: Started sshd@1-10.0.0.22:22-10.0.0.1:40292.service. Jul 10 00:23:11.687501 sshd[1293]: Accepted publickey for core from 10.0.0.1 port 40292 ssh2: RSA SHA256:qOVwIcEhxIMbnnVzVACNg4ZPFMKwsyA0M9qFZXlj7es Jul 10 00:23:11.688886 sshd[1293]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 10 00:23:11.692510 systemd-logind[1206]: New session 2 of user core. Jul 10 00:23:11.693418 systemd[1]: Started session-2.scope. Jul 10 00:23:11.747442 sshd[1293]: pam_unix(sshd:session): session closed for user core Jul 10 00:23:11.749798 systemd[1]: sshd@1-10.0.0.22:22-10.0.0.1:40292.service: Deactivated successfully. Jul 10 00:23:11.750353 systemd[1]: session-2.scope: Deactivated successfully. Jul 10 00:23:11.750880 systemd-logind[1206]: Session 2 logged out. Waiting for processes to exit. Jul 10 00:23:11.751919 systemd[1]: Started sshd@2-10.0.0.22:22-10.0.0.1:40298.service. Jul 10 00:23:11.752484 systemd-logind[1206]: Removed session 2. Jul 10 00:23:11.789843 sshd[1299]: Accepted publickey for core from 10.0.0.1 port 40298 ssh2: RSA SHA256:qOVwIcEhxIMbnnVzVACNg4ZPFMKwsyA0M9qFZXlj7es Jul 10 00:23:11.791026 sshd[1299]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 10 00:23:11.794302 systemd-logind[1206]: New session 3 of user core. Jul 10 00:23:11.795104 systemd[1]: Started session-3.scope. Jul 10 00:23:11.843119 sshd[1299]: pam_unix(sshd:session): session closed for user core Jul 10 00:23:11.845739 systemd[1]: sshd@2-10.0.0.22:22-10.0.0.1:40298.service: Deactivated successfully. Jul 10 00:23:11.846287 systemd[1]: session-3.scope: Deactivated successfully. Jul 10 00:23:11.846780 systemd-logind[1206]: Session 3 logged out. Waiting for processes to exit. Jul 10 00:23:11.847807 systemd[1]: Started sshd@3-10.0.0.22:22-10.0.0.1:40300.service. Jul 10 00:23:11.848434 systemd-logind[1206]: Removed session 3. Jul 10 00:23:11.886368 sshd[1305]: Accepted publickey for core from 10.0.0.1 port 40300 ssh2: RSA SHA256:qOVwIcEhxIMbnnVzVACNg4ZPFMKwsyA0M9qFZXlj7es Jul 10 00:23:11.887543 sshd[1305]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 10 00:23:11.890663 systemd-logind[1206]: New session 4 of user core. Jul 10 00:23:11.891480 systemd[1]: Started session-4.scope. Jul 10 00:23:11.944459 sshd[1305]: pam_unix(sshd:session): session closed for user core Jul 10 00:23:11.947123 systemd[1]: sshd@3-10.0.0.22:22-10.0.0.1:40300.service: Deactivated successfully. Jul 10 00:23:11.947737 systemd[1]: session-4.scope: Deactivated successfully. Jul 10 00:23:11.948192 systemd-logind[1206]: Session 4 logged out. Waiting for processes to exit. Jul 10 00:23:11.949235 systemd[1]: Started sshd@4-10.0.0.22:22-10.0.0.1:40302.service. Jul 10 00:23:11.949893 systemd-logind[1206]: Removed session 4. Jul 10 00:23:11.988403 sshd[1311]: Accepted publickey for core from 10.0.0.1 port 40302 ssh2: RSA SHA256:qOVwIcEhxIMbnnVzVACNg4ZPFMKwsyA0M9qFZXlj7es Jul 10 00:23:11.989659 sshd[1311]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 10 00:23:11.993068 systemd-logind[1206]: New session 5 of user core. Jul 10 00:23:11.993900 systemd[1]: Started session-5.scope. Jul 10 00:23:12.058380 sudo[1314]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Jul 10 00:23:12.059237 sudo[1314]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Jul 10 00:23:12.073671 dbus-daemon[1195]: avc: received setenforce notice (enforcing=1) Jul 10 00:23:12.075440 sudo[1314]: pam_unix(sudo:session): session closed for user root Jul 10 00:23:12.077706 sshd[1311]: pam_unix(sshd:session): session closed for user core Jul 10 00:23:12.081375 systemd[1]: sshd@4-10.0.0.22:22-10.0.0.1:40302.service: Deactivated successfully. Jul 10 00:23:12.082012 systemd[1]: session-5.scope: Deactivated successfully. Jul 10 00:23:12.082605 systemd-logind[1206]: Session 5 logged out. Waiting for processes to exit. Jul 10 00:23:12.083939 systemd[1]: Started sshd@5-10.0.0.22:22-10.0.0.1:40306.service. Jul 10 00:23:12.084736 systemd-logind[1206]: Removed session 5. Jul 10 00:23:12.123171 sshd[1318]: Accepted publickey for core from 10.0.0.1 port 40306 ssh2: RSA SHA256:qOVwIcEhxIMbnnVzVACNg4ZPFMKwsyA0M9qFZXlj7es Jul 10 00:23:12.124607 sshd[1318]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 10 00:23:12.128002 systemd-logind[1206]: New session 6 of user core. Jul 10 00:23:12.128832 systemd[1]: Started session-6.scope. Jul 10 00:23:12.181020 sudo[1322]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Jul 10 00:23:12.181248 sudo[1322]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Jul 10 00:23:12.183813 sudo[1322]: pam_unix(sudo:session): session closed for user root Jul 10 00:23:12.188141 sudo[1321]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Jul 10 00:23:12.188357 sudo[1321]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Jul 10 00:23:12.196959 systemd[1]: Stopping audit-rules.service... Jul 10 00:23:12.197000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Jul 10 00:23:12.198619 kernel: kauditd_printk_skb: 166 callbacks suppressed Jul 10 00:23:12.198652 kernel: audit: type=1305 audit(1752106992.197:204): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Jul 10 00:23:12.197000 audit[1325]: SYSCALL arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=fffff95ff510 a2=420 a3=0 items=0 ppid=1 pid=1325 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:23:12.199979 auditctl[1325]: No rules Jul 10 00:23:12.200266 systemd[1]: audit-rules.service: Deactivated successfully. Jul 10 00:23:12.200425 systemd[1]: Stopped audit-rules.service. Jul 10 00:23:12.201837 systemd[1]: Starting audit-rules.service... Jul 10 00:23:12.202376 kernel: audit: type=1300 audit(1752106992.197:204): arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=fffff95ff510 a2=420 a3=0 items=0 ppid=1 pid=1325 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:23:12.202406 kernel: audit: type=1327 audit(1752106992.197:204): proctitle=2F7362696E2F617564697463746C002D44 Jul 10 00:23:12.197000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Jul 10 00:23:12.203234 kernel: audit: type=1131 audit(1752106992.199:205): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:23:12.199000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:23:12.216886 augenrules[1342]: No rules Jul 10 00:23:12.217503 systemd[1]: Finished audit-rules.service. Jul 10 00:23:12.217000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:23:12.219711 sudo[1321]: pam_unix(sudo:session): session closed for user root Jul 10 00:23:12.219000 audit[1321]: USER_END pid=1321 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 10 00:23:12.221096 sshd[1318]: pam_unix(sshd:session): session closed for user core Jul 10 00:23:12.222839 kernel: audit: type=1130 audit(1752106992.217:206): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:23:12.222885 kernel: audit: type=1106 audit(1752106992.219:207): pid=1321 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 10 00:23:12.222901 kernel: audit: type=1104 audit(1752106992.219:208): pid=1321 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 10 00:23:12.219000 audit[1321]: CRED_DISP pid=1321 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 10 00:23:12.223615 systemd[1]: sshd@5-10.0.0.22:22-10.0.0.1:40306.service: Deactivated successfully. Jul 10 00:23:12.224131 systemd[1]: session-6.scope: Deactivated successfully. Jul 10 00:23:12.224629 systemd-logind[1206]: Session 6 logged out. Waiting for processes to exit. Jul 10 00:23:12.219000 audit[1318]: USER_END pid=1318 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 10 00:23:12.225572 systemd[1]: Started sshd@6-10.0.0.22:22-10.0.0.1:40314.service. Jul 10 00:23:12.226202 systemd-logind[1206]: Removed session 6. Jul 10 00:23:12.227235 kernel: audit: type=1106 audit(1752106992.219:209): pid=1318 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 10 00:23:12.227285 kernel: audit: type=1104 audit(1752106992.219:210): pid=1318 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 10 00:23:12.219000 audit[1318]: CRED_DISP pid=1318 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 10 00:23:12.229353 kernel: audit: type=1131 audit(1752106992.222:211): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.0.0.22:22-10.0.0.1:40306 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:23:12.222000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.0.0.22:22-10.0.0.1:40306 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:23:12.224000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.22:22-10.0.0.1:40314 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:23:12.263000 audit[1348]: USER_ACCT pid=1348 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 10 00:23:12.264295 sshd[1348]: Accepted publickey for core from 10.0.0.1 port 40314 ssh2: RSA SHA256:qOVwIcEhxIMbnnVzVACNg4ZPFMKwsyA0M9qFZXlj7es Jul 10 00:23:12.265000 audit[1348]: CRED_ACQ pid=1348 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 10 00:23:12.265000 audit[1348]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffff269b5d0 a2=3 a3=1 items=0 ppid=1 pid=1348 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=7 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:23:12.265000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 10 00:23:12.265873 sshd[1348]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 10 00:23:12.269014 systemd-logind[1206]: New session 7 of user core. Jul 10 00:23:12.269845 systemd[1]: Started session-7.scope. Jul 10 00:23:12.272000 audit[1348]: USER_START pid=1348 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 10 00:23:12.273000 audit[1350]: CRED_ACQ pid=1350 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 10 00:23:12.320716 sudo[1351]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Jul 10 00:23:12.320000 audit[1351]: USER_ACCT pid=1351 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 10 00:23:12.320000 audit[1351]: CRED_REFR pid=1351 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 10 00:23:12.321639 sudo[1351]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Jul 10 00:23:12.322000 audit[1351]: USER_START pid=1351 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 10 00:23:12.333101 systemd[1]: Starting coreos-metadata.service... Jul 10 00:23:12.339287 systemd[1]: coreos-metadata.service: Deactivated successfully. Jul 10 00:23:12.339432 systemd[1]: Finished coreos-metadata.service. Jul 10 00:23:12.339000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=coreos-metadata comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:23:12.339000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=coreos-metadata comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:23:12.870413 systemd[1]: Stopped kubelet.service. Jul 10 00:23:12.870000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:23:12.870000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:23:12.872540 systemd[1]: Starting kubelet.service... Jul 10 00:23:12.892793 systemd[1]: Reloading. Jul 10 00:23:12.939246 /usr/lib/systemd/system-generators/torcx-generator[1411]: time="2025-07-10T00:23:12Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" Jul 10 00:23:12.939275 /usr/lib/systemd/system-generators/torcx-generator[1411]: time="2025-07-10T00:23:12Z" level=info msg="torcx already run" Jul 10 00:23:13.024106 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Jul 10 00:23:13.024126 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Jul 10 00:23:13.039940 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Jul 10 00:23:13.088000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:13.088000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:13.088000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:13.088000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:13.088000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:13.088000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:13.088000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:13.088000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:13.088000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:13.088000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:13.088000 audit: BPF prog-id=40 op=LOAD Jul 10 00:23:13.088000 audit: BPF prog-id=34 op=UNLOAD Jul 10 00:23:13.089000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:13.089000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:13.089000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:13.089000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:13.089000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:13.089000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:13.089000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:13.089000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:13.089000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:13.089000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:13.089000 audit: BPF prog-id=41 op=LOAD Jul 10 00:23:13.089000 audit: BPF prog-id=38 op=UNLOAD Jul 10 00:23:13.089000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:13.089000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:13.089000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:13.089000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:13.089000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:13.089000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:13.089000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:13.089000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:13.089000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:13.090000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:13.090000 audit: BPF prog-id=42 op=LOAD Jul 10 00:23:13.090000 audit: BPF prog-id=24 op=UNLOAD Jul 10 00:23:13.090000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:13.090000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:13.090000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:13.090000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:13.090000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:13.090000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:13.090000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:13.090000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:13.090000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:13.090000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:13.090000 audit: BPF prog-id=43 op=LOAD Jul 10 00:23:13.090000 audit: BPF prog-id=25 op=UNLOAD Jul 10 00:23:13.090000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:13.090000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:13.090000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:13.090000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:13.090000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:13.090000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:13.090000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:13.090000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:13.090000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:13.090000 audit: BPF prog-id=44 op=LOAD Jul 10 00:23:13.090000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:13.090000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:13.090000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:13.090000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:13.090000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:13.090000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:13.090000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:13.090000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:13.090000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:13.090000 audit: BPF prog-id=45 op=LOAD Jul 10 00:23:13.090000 audit: BPF prog-id=26 op=UNLOAD Jul 10 00:23:13.090000 audit: BPF prog-id=27 op=UNLOAD Jul 10 00:23:13.091000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:13.091000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:13.091000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:13.091000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:13.091000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:13.091000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:13.091000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:13.091000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:13.091000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:13.091000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:13.091000 audit: BPF prog-id=46 op=LOAD Jul 10 00:23:13.091000 audit: BPF prog-id=35 op=UNLOAD Jul 10 00:23:13.091000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:13.092000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:13.092000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:13.092000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:13.092000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:13.092000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:13.092000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:13.092000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:13.092000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:13.092000 audit: BPF prog-id=47 op=LOAD Jul 10 00:23:13.092000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:13.092000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:13.092000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:13.092000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:13.092000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:13.092000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:13.092000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:13.092000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:13.092000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:13.092000 audit: BPF prog-id=48 op=LOAD Jul 10 00:23:13.092000 audit: BPF prog-id=36 op=UNLOAD Jul 10 00:23:13.092000 audit: BPF prog-id=37 op=UNLOAD Jul 10 00:23:13.092000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:13.092000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:13.092000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:13.092000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:13.092000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:13.092000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:13.092000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:13.092000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:13.092000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:13.092000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:13.092000 audit: BPF prog-id=49 op=LOAD Jul 10 00:23:13.092000 audit: BPF prog-id=28 op=UNLOAD Jul 10 00:23:13.092000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:13.092000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:13.092000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:13.092000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:13.092000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:13.092000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:13.092000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:13.092000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:13.092000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:13.092000 audit: BPF prog-id=50 op=LOAD Jul 10 00:23:13.092000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:13.092000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:13.092000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:13.092000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:13.092000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:13.092000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:13.092000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:13.092000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:13.092000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:13.092000 audit: BPF prog-id=51 op=LOAD Jul 10 00:23:13.092000 audit: BPF prog-id=29 op=UNLOAD Jul 10 00:23:13.092000 audit: BPF prog-id=30 op=UNLOAD Jul 10 00:23:13.093000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:13.093000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:13.093000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:13.093000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:13.093000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:13.093000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:13.093000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:13.093000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:13.093000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:13.093000 audit: BPF prog-id=52 op=LOAD Jul 10 00:23:13.093000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:13.093000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:13.093000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:13.093000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:13.093000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:13.093000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:13.093000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:13.093000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:13.093000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:13.093000 audit: BPF prog-id=53 op=LOAD Jul 10 00:23:13.093000 audit: BPF prog-id=31 op=UNLOAD Jul 10 00:23:13.093000 audit: BPF prog-id=32 op=UNLOAD Jul 10 00:23:13.094000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:13.094000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:13.094000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:13.094000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:13.094000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:13.094000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:13.094000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:13.094000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:13.094000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:13.095000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:13.095000 audit: BPF prog-id=54 op=LOAD Jul 10 00:23:13.095000 audit: BPF prog-id=33 op=UNLOAD Jul 10 00:23:13.105588 systemd[1]: Started kubelet.service. Jul 10 00:23:13.105000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:23:13.107218 systemd[1]: Stopping kubelet.service... Jul 10 00:23:13.107511 systemd[1]: kubelet.service: Deactivated successfully. Jul 10 00:23:13.107695 systemd[1]: Stopped kubelet.service. Jul 10 00:23:13.107000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:23:13.109118 systemd[1]: Starting kubelet.service... Jul 10 00:23:13.203371 systemd[1]: Started kubelet.service. Jul 10 00:23:13.203000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:23:13.240165 kubelet[1455]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Jul 10 00:23:13.240165 kubelet[1455]: Flag --pod-infra-container-image has been deprecated, will be removed in 1.35. Image garbage collector will get sandbox image information from CRI. Jul 10 00:23:13.240165 kubelet[1455]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Jul 10 00:23:13.240639 kubelet[1455]: I0710 00:23:13.240232 1455 server.go:215] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Jul 10 00:23:13.686434 kubelet[1455]: I0710 00:23:13.686328 1455 server.go:520] "Kubelet version" kubeletVersion="v1.32.4" Jul 10 00:23:13.686586 kubelet[1455]: I0710 00:23:13.686573 1455 server.go:522] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Jul 10 00:23:13.686912 kubelet[1455]: I0710 00:23:13.686891 1455 server.go:954] "Client rotation is on, will bootstrap in background" Jul 10 00:23:13.741706 kubelet[1455]: I0710 00:23:13.741675 1455 dynamic_cafile_content.go:161] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Jul 10 00:23:13.753431 kubelet[1455]: E0710 00:23:13.753382 1455 log.go:32] "RuntimeConfig from runtime service failed" err="rpc error: code = Unimplemented desc = unknown method RuntimeConfig for service runtime.v1.RuntimeService" Jul 10 00:23:13.753431 kubelet[1455]: I0710 00:23:13.753423 1455 server.go:1421] "CRI implementation should be updated to support RuntimeConfig when KubeletCgroupDriverFromCRI feature gate has been enabled. Falling back to using cgroupDriver from kubelet config." Jul 10 00:23:13.756282 kubelet[1455]: I0710 00:23:13.756238 1455 server.go:772] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Jul 10 00:23:13.757013 kubelet[1455]: I0710 00:23:13.756960 1455 container_manager_linux.go:268] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Jul 10 00:23:13.757349 kubelet[1455]: I0710 00:23:13.757014 1455 container_manager_linux.go:273] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"10.0.0.22","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null,"CgroupVersion":2} Jul 10 00:23:13.757482 kubelet[1455]: I0710 00:23:13.757430 1455 topology_manager.go:138] "Creating topology manager with none policy" Jul 10 00:23:13.757482 kubelet[1455]: I0710 00:23:13.757452 1455 container_manager_linux.go:304] "Creating device plugin manager" Jul 10 00:23:13.757699 kubelet[1455]: I0710 00:23:13.757683 1455 state_mem.go:36] "Initialized new in-memory state store" Jul 10 00:23:13.761590 kubelet[1455]: I0710 00:23:13.761566 1455 kubelet.go:446] "Attempting to sync node with API server" Jul 10 00:23:13.761707 kubelet[1455]: I0710 00:23:13.761695 1455 kubelet.go:341] "Adding static pod path" path="/etc/kubernetes/manifests" Jul 10 00:23:13.761773 kubelet[1455]: I0710 00:23:13.761764 1455 kubelet.go:352] "Adding apiserver pod source" Jul 10 00:23:13.761858 kubelet[1455]: I0710 00:23:13.761847 1455 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Jul 10 00:23:13.769801 kubelet[1455]: E0710 00:23:13.769765 1455 file.go:98] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 00:23:13.769801 kubelet[1455]: E0710 00:23:13.769800 1455 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 00:23:13.773288 kubelet[1455]: I0710 00:23:13.773269 1455 kuberuntime_manager.go:269] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Jul 10 00:23:13.774134 kubelet[1455]: I0710 00:23:13.774114 1455 kubelet.go:890] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" Jul 10 00:23:13.774339 kubelet[1455]: W0710 00:23:13.774319 1455 probe.go:272] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Jul 10 00:23:13.775309 kubelet[1455]: I0710 00:23:13.775289 1455 watchdog_linux.go:99] "Systemd watchdog is not enabled" Jul 10 00:23:13.775430 kubelet[1455]: I0710 00:23:13.775419 1455 server.go:1287] "Started kubelet" Jul 10 00:23:13.775801 kubelet[1455]: I0710 00:23:13.775755 1455 server.go:169] "Starting to listen" address="0.0.0.0" port=10250 Jul 10 00:23:13.776621 kubelet[1455]: I0710 00:23:13.776599 1455 server.go:479] "Adding debug handlers to kubelet server" Jul 10 00:23:13.778000 audit[1455]: AVC avc: denied { mac_admin } for pid=1455 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:13.778000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Jul 10 00:23:13.778000 audit[1455]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000b82060 a1=40007d27c8 a2=4000b82030 a3=25 items=0 ppid=1 pid=1455 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:23:13.778000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Jul 10 00:23:13.778000 audit[1455]: AVC avc: denied { mac_admin } for pid=1455 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:13.778000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Jul 10 00:23:13.778000 audit[1455]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000371840 a1=40007d27e0 a2=4000b820f0 a3=25 items=0 ppid=1 pid=1455 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:23:13.778000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Jul 10 00:23:13.779004 kubelet[1455]: I0710 00:23:13.778657 1455 kubelet.go:1507] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/plugins_registry: invalid argument" Jul 10 00:23:13.779004 kubelet[1455]: I0710 00:23:13.778721 1455 kubelet.go:1511] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/plugins: invalid argument" Jul 10 00:23:13.779004 kubelet[1455]: I0710 00:23:13.778805 1455 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Jul 10 00:23:13.779572 kubelet[1455]: I0710 00:23:13.779443 1455 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 Jul 10 00:23:13.780074 kubelet[1455]: I0710 00:23:13.780052 1455 server.go:243] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Jul 10 00:23:13.780216 kubelet[1455]: I0710 00:23:13.779651 1455 dynamic_serving_content.go:135] "Starting controller" name="kubelet-server-cert-files::/var/lib/kubelet/pki/kubelet.crt::/var/lib/kubelet/pki/kubelet.key" Jul 10 00:23:13.781418 kubelet[1455]: E0710 00:23:13.781384 1455 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"10.0.0.22\" not found" Jul 10 00:23:13.781500 kubelet[1455]: I0710 00:23:13.781431 1455 volume_manager.go:297] "Starting Kubelet Volume Manager" Jul 10 00:23:13.781926 kubelet[1455]: I0710 00:23:13.781841 1455 desired_state_of_world_populator.go:150] "Desired state populator starts to run" Jul 10 00:23:13.782136 kubelet[1455]: I0710 00:23:13.781901 1455 reconciler.go:26] "Reconciler: start to sync state" Jul 10 00:23:13.782271 kubelet[1455]: E0710 00:23:13.782243 1455 kubelet.go:1555] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Jul 10 00:23:13.782630 kubelet[1455]: I0710 00:23:13.782599 1455 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory Jul 10 00:23:13.783730 kubelet[1455]: I0710 00:23:13.783706 1455 factory.go:221] Registration of the containerd container factory successfully Jul 10 00:23:13.783831 kubelet[1455]: I0710 00:23:13.783815 1455 factory.go:221] Registration of the systemd container factory successfully Jul 10 00:23:13.799058 kubelet[1455]: E0710 00:23:13.799019 1455 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"10.0.0.22\" not found" node="10.0.0.22" Jul 10 00:23:13.799418 kubelet[1455]: I0710 00:23:13.799400 1455 cpu_manager.go:221] "Starting CPU manager" policy="none" Jul 10 00:23:13.799418 kubelet[1455]: I0710 00:23:13.799412 1455 cpu_manager.go:222] "Reconciling" reconcilePeriod="10s" Jul 10 00:23:13.799511 kubelet[1455]: I0710 00:23:13.799449 1455 state_mem.go:36] "Initialized new in-memory state store" Jul 10 00:23:13.803000 audit[1470]: NETFILTER_CFG table=mangle:2 family=2 entries=2 op=nft_register_chain pid=1470 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 10 00:23:13.803000 audit[1470]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=fffffa969f80 a2=0 a3=1 items=0 ppid=1455 pid=1470 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:23:13.803000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Jul 10 00:23:13.805000 audit[1476]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=1476 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 10 00:23:13.805000 audit[1476]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=132 a0=3 a1=fffff1c48fc0 a2=0 a3=1 items=0 ppid=1455 pid=1476 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:23:13.805000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Jul 10 00:23:13.881551 kubelet[1455]: E0710 00:23:13.881506 1455 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"10.0.0.22\" not found" Jul 10 00:23:13.882465 kubelet[1455]: I0710 00:23:13.882434 1455 policy_none.go:49] "None policy: Start" Jul 10 00:23:13.882465 kubelet[1455]: I0710 00:23:13.882469 1455 memory_manager.go:186] "Starting memorymanager" policy="None" Jul 10 00:23:13.882536 kubelet[1455]: I0710 00:23:13.882482 1455 state_mem.go:35] "Initializing new in-memory state store" Jul 10 00:23:13.806000 audit[1478]: NETFILTER_CFG table=filter:4 family=2 entries=2 op=nft_register_chain pid=1478 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 10 00:23:13.806000 audit[1478]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=312 a0=3 a1=ffffc950ac40 a2=0 a3=1 items=0 ppid=1455 pid=1478 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:23:13.806000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Jul 10 00:23:13.887415 systemd[1]: Created slice kubepods.slice. Jul 10 00:23:13.887000 audit[1483]: NETFILTER_CFG table=filter:5 family=2 entries=2 op=nft_register_chain pid=1483 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 10 00:23:13.887000 audit[1483]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=312 a0=3 a1=ffffe0a27d70 a2=0 a3=1 items=0 ppid=1455 pid=1483 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:23:13.887000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Jul 10 00:23:13.893120 systemd[1]: Created slice kubepods-burstable.slice. Jul 10 00:23:13.897063 systemd[1]: Created slice kubepods-besteffort.slice. Jul 10 00:23:13.908266 kubelet[1455]: I0710 00:23:13.908233 1455 manager.go:519] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Jul 10 00:23:13.907000 audit[1455]: AVC avc: denied { mac_admin } for pid=1455 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:13.907000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Jul 10 00:23:13.907000 audit[1455]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000b82390 a1=40007d2f18 a2=4000b82360 a3=25 items=0 ppid=1 pid=1455 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:23:13.907000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Jul 10 00:23:13.908659 kubelet[1455]: I0710 00:23:13.908619 1455 server.go:94] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/device-plugins/: invalid argument" Jul 10 00:23:13.908858 kubelet[1455]: I0710 00:23:13.908841 1455 eviction_manager.go:189] "Eviction manager: starting control loop" Jul 10 00:23:13.908960 kubelet[1455]: I0710 00:23:13.908926 1455 container_log_manager.go:189] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" Jul 10 00:23:13.909178 kubelet[1455]: I0710 00:23:13.909154 1455 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Jul 10 00:23:13.910683 kubelet[1455]: E0710 00:23:13.910654 1455 eviction_manager.go:267] "eviction manager: failed to check if we have separate container filesystem. Ignoring." err="no imagefs label for configured runtime" Jul 10 00:23:13.910744 kubelet[1455]: E0710 00:23:13.910710 1455 eviction_manager.go:292] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"10.0.0.22\" not found" Jul 10 00:23:13.929000 audit[1488]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=1488 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 10 00:23:13.929000 audit[1488]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=924 a0=3 a1=fffff9b2e230 a2=0 a3=1 items=0 ppid=1455 pid=1488 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:23:13.929000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Jul 10 00:23:13.930581 kubelet[1455]: I0710 00:23:13.930511 1455 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Jul 10 00:23:13.930000 audit[1489]: NETFILTER_CFG table=mangle:7 family=10 entries=2 op=nft_register_chain pid=1489 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 10 00:23:13.930000 audit[1490]: NETFILTER_CFG table=mangle:8 family=2 entries=1 op=nft_register_chain pid=1490 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 10 00:23:13.930000 audit[1490]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=fffffd504010 a2=0 a3=1 items=0 ppid=1455 pid=1490 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:23:13.930000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Jul 10 00:23:13.930000 audit[1489]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=ffffdacc3e30 a2=0 a3=1 items=0 ppid=1455 pid=1489 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:23:13.930000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Jul 10 00:23:13.931876 kubelet[1455]: I0710 00:23:13.931838 1455 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Jul 10 00:23:13.931876 kubelet[1455]: I0710 00:23:13.931870 1455 status_manager.go:227] "Starting to sync pod status with apiserver" Jul 10 00:23:13.931948 kubelet[1455]: I0710 00:23:13.931894 1455 watchdog_linux.go:127] "Systemd watchdog is not enabled or the interval is invalid, so health checking will not be started." Jul 10 00:23:13.931948 kubelet[1455]: I0710 00:23:13.931901 1455 kubelet.go:2382] "Starting kubelet main sync loop" Jul 10 00:23:13.932028 kubelet[1455]: E0710 00:23:13.932012 1455 kubelet.go:2406] "Skipping pod synchronization" err="PLEG is not healthy: pleg has yet to be successful" Jul 10 00:23:13.932000 audit[1491]: NETFILTER_CFG table=nat:9 family=2 entries=2 op=nft_register_chain pid=1491 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 10 00:23:13.932000 audit[1491]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=128 a0=3 a1=ffffc01a04f0 a2=0 a3=1 items=0 ppid=1455 pid=1491 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:23:13.932000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Jul 10 00:23:13.933000 audit[1492]: NETFILTER_CFG table=mangle:10 family=10 entries=1 op=nft_register_chain pid=1492 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 10 00:23:13.933000 audit[1492]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffc95daab0 a2=0 a3=1 items=0 ppid=1455 pid=1492 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:23:13.933000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Jul 10 00:23:13.933000 audit[1493]: NETFILTER_CFG table=filter:11 family=2 entries=1 op=nft_register_chain pid=1493 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 10 00:23:13.933000 audit[1493]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffd46d6670 a2=0 a3=1 items=0 ppid=1455 pid=1493 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:23:13.933000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Jul 10 00:23:13.934000 audit[1494]: NETFILTER_CFG table=nat:12 family=10 entries=2 op=nft_register_chain pid=1494 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 10 00:23:13.934000 audit[1494]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=128 a0=3 a1=ffffdcb73e90 a2=0 a3=1 items=0 ppid=1455 pid=1494 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:23:13.934000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Jul 10 00:23:13.935000 audit[1495]: NETFILTER_CFG table=filter:13 family=10 entries=2 op=nft_register_chain pid=1495 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 10 00:23:13.935000 audit[1495]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=fffffeed2370 a2=0 a3=1 items=0 ppid=1455 pid=1495 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:23:13.935000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Jul 10 00:23:14.010086 kubelet[1455]: I0710 00:23:14.009997 1455 kubelet_node_status.go:75] "Attempting to register node" node="10.0.0.22" Jul 10 00:23:14.022278 kubelet[1455]: I0710 00:23:14.022234 1455 kubelet_node_status.go:78] "Successfully registered node" node="10.0.0.22" Jul 10 00:23:14.137053 kubelet[1455]: I0710 00:23:14.137026 1455 kuberuntime_manager.go:1702] "Updating runtime config through cri with podcidr" CIDR="192.168.1.0/24" Jul 10 00:23:14.137511 env[1217]: time="2025-07-10T00:23:14.137471446Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Jul 10 00:23:14.137776 kubelet[1455]: I0710 00:23:14.137665 1455 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.1.0/24" Jul 10 00:23:14.234000 audit[1351]: USER_END pid=1351 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 10 00:23:14.234000 audit[1351]: CRED_DISP pid=1351 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 10 00:23:14.235256 sudo[1351]: pam_unix(sudo:session): session closed for user root Jul 10 00:23:14.236703 sshd[1348]: pam_unix(sshd:session): session closed for user core Jul 10 00:23:14.237000 audit[1348]: USER_END pid=1348 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 10 00:23:14.237000 audit[1348]: CRED_DISP pid=1348 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 10 00:23:14.239174 systemd[1]: sshd@6-10.0.0.22:22-10.0.0.1:40314.service: Deactivated successfully. Jul 10 00:23:14.238000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.22:22-10.0.0.1:40314 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:23:14.239872 systemd[1]: session-7.scope: Deactivated successfully. Jul 10 00:23:14.242096 systemd-logind[1206]: Session 7 logged out. Waiting for processes to exit. Jul 10 00:23:14.242760 systemd-logind[1206]: Removed session 7. Jul 10 00:23:14.689098 kubelet[1455]: I0710 00:23:14.689052 1455 transport.go:147] "Certificate rotation detected, shutting down client connections to start using new credentials" Jul 10 00:23:14.689515 kubelet[1455]: W0710 00:23:14.689493 1455 reflector.go:492] k8s.io/client-go/informers/factory.go:160: watch of *v1.RuntimeClass ended with: very short watch: k8s.io/client-go/informers/factory.go:160: Unexpected watch close - watch lasted less than a second and no items received Jul 10 00:23:14.689585 kubelet[1455]: W0710 00:23:14.689493 1455 reflector.go:492] k8s.io/client-go/informers/factory.go:160: watch of *v1.Service ended with: very short watch: k8s.io/client-go/informers/factory.go:160: Unexpected watch close - watch lasted less than a second and no items received Jul 10 00:23:14.689759 kubelet[1455]: W0710 00:23:14.689735 1455 reflector.go:492] k8s.io/client-go/informers/factory.go:160: watch of *v1.CSIDriver ended with: very short watch: k8s.io/client-go/informers/factory.go:160: Unexpected watch close - watch lasted less than a second and no items received Jul 10 00:23:14.762595 kubelet[1455]: I0710 00:23:14.762552 1455 apiserver.go:52] "Watching apiserver" Jul 10 00:23:14.766529 kubelet[1455]: E0710 00:23:14.766487 1455 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-bb72p" podUID="ac010dd4-3be4-467e-b5c3-63ff2bfb42e5" Jul 10 00:23:14.769892 kubelet[1455]: E0710 00:23:14.769870 1455 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 00:23:14.771626 systemd[1]: Created slice kubepods-besteffort-pod95d70a92_6249_4ae8_8ecb_9316ee654540.slice. Jul 10 00:23:14.781228 systemd[1]: Created slice kubepods-besteffort-pod056495b9_abd3_48d4_8c52_d92102d487a0.slice. Jul 10 00:23:14.782492 kubelet[1455]: I0710 00:23:14.782466 1455 desired_state_of_world_populator.go:158] "Finished populating initial desired state of world" Jul 10 00:23:14.788423 kubelet[1455]: I0710 00:23:14.788399 1455 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-dddnx\" (UniqueName: \"kubernetes.io/projected/95d70a92-6249-4ae8-8ecb-9316ee654540-kube-api-access-dddnx\") pod \"calico-node-h4vml\" (UID: \"95d70a92-6249-4ae8-8ecb-9316ee654540\") " pod="calico-system/calico-node-h4vml" Jul 10 00:23:14.788553 kubelet[1455]: I0710 00:23:14.788527 1455 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/ac010dd4-3be4-467e-b5c3-63ff2bfb42e5-kubelet-dir\") pod \"csi-node-driver-bb72p\" (UID: \"ac010dd4-3be4-467e-b5c3-63ff2bfb42e5\") " pod="calico-system/csi-node-driver-bb72p" Jul 10 00:23:14.788595 kubelet[1455]: I0710 00:23:14.788562 1455 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/ac010dd4-3be4-467e-b5c3-63ff2bfb42e5-registration-dir\") pod \"csi-node-driver-bb72p\" (UID: \"ac010dd4-3be4-467e-b5c3-63ff2bfb42e5\") " pod="calico-system/csi-node-driver-bb72p" Jul 10 00:23:14.788636 kubelet[1455]: I0710 00:23:14.788615 1455 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-qdz64\" (UniqueName: \"kubernetes.io/projected/ac010dd4-3be4-467e-b5c3-63ff2bfb42e5-kube-api-access-qdz64\") pod \"csi-node-driver-bb72p\" (UID: \"ac010dd4-3be4-467e-b5c3-63ff2bfb42e5\") " pod="calico-system/csi-node-driver-bb72p" Jul 10 00:23:14.788636 kubelet[1455]: I0710 00:23:14.788633 1455 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/95d70a92-6249-4ae8-8ecb-9316ee654540-cni-net-dir\") pod \"calico-node-h4vml\" (UID: \"95d70a92-6249-4ae8-8ecb-9316ee654540\") " pod="calico-system/calico-node-h4vml" Jul 10 00:23:14.788690 kubelet[1455]: I0710 00:23:14.788648 1455 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/95d70a92-6249-4ae8-8ecb-9316ee654540-lib-modules\") pod \"calico-node-h4vml\" (UID: \"95d70a92-6249-4ae8-8ecb-9316ee654540\") " pod="calico-system/calico-node-h4vml" Jul 10 00:23:14.788690 kubelet[1455]: I0710 00:23:14.788664 1455 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/95d70a92-6249-4ae8-8ecb-9316ee654540-policysync\") pod \"calico-node-h4vml\" (UID: \"95d70a92-6249-4ae8-8ecb-9316ee654540\") " pod="calico-system/calico-node-h4vml" Jul 10 00:23:14.788732 kubelet[1455]: I0710 00:23:14.788690 1455 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/95d70a92-6249-4ae8-8ecb-9316ee654540-tigera-ca-bundle\") pod \"calico-node-h4vml\" (UID: \"95d70a92-6249-4ae8-8ecb-9316ee654540\") " pod="calico-system/calico-node-h4vml" Jul 10 00:23:14.788732 kubelet[1455]: I0710 00:23:14.788707 1455 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/056495b9-abd3-48d4-8c52-d92102d487a0-lib-modules\") pod \"kube-proxy-pnzwq\" (UID: \"056495b9-abd3-48d4-8c52-d92102d487a0\") " pod="kube-system/kube-proxy-pnzwq" Jul 10 00:23:14.788777 kubelet[1455]: I0710 00:23:14.788747 1455 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/056495b9-abd3-48d4-8c52-d92102d487a0-kube-proxy\") pod \"kube-proxy-pnzwq\" (UID: \"056495b9-abd3-48d4-8c52-d92102d487a0\") " pod="kube-system/kube-proxy-pnzwq" Jul 10 00:23:14.788803 kubelet[1455]: I0710 00:23:14.788793 1455 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-6wn67\" (UniqueName: \"kubernetes.io/projected/056495b9-abd3-48d4-8c52-d92102d487a0-kube-api-access-6wn67\") pod \"kube-proxy-pnzwq\" (UID: \"056495b9-abd3-48d4-8c52-d92102d487a0\") " pod="kube-system/kube-proxy-pnzwq" Jul 10 00:23:14.788825 kubelet[1455]: I0710 00:23:14.788814 1455 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/95d70a92-6249-4ae8-8ecb-9316ee654540-cni-log-dir\") pod \"calico-node-h4vml\" (UID: \"95d70a92-6249-4ae8-8ecb-9316ee654540\") " pod="calico-system/calico-node-h4vml" Jul 10 00:23:14.788859 kubelet[1455]: I0710 00:23:14.788845 1455 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/95d70a92-6249-4ae8-8ecb-9316ee654540-var-lib-calico\") pod \"calico-node-h4vml\" (UID: \"95d70a92-6249-4ae8-8ecb-9316ee654540\") " pod="calico-system/calico-node-h4vml" Jul 10 00:23:14.788891 kubelet[1455]: I0710 00:23:14.788868 1455 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/95d70a92-6249-4ae8-8ecb-9316ee654540-var-run-calico\") pod \"calico-node-h4vml\" (UID: \"95d70a92-6249-4ae8-8ecb-9316ee654540\") " pod="calico-system/calico-node-h4vml" Jul 10 00:23:14.788891 kubelet[1455]: I0710 00:23:14.788884 1455 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/ac010dd4-3be4-467e-b5c3-63ff2bfb42e5-varrun\") pod \"csi-node-driver-bb72p\" (UID: \"ac010dd4-3be4-467e-b5c3-63ff2bfb42e5\") " pod="calico-system/csi-node-driver-bb72p" Jul 10 00:23:14.788932 kubelet[1455]: I0710 00:23:14.788900 1455 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/95d70a92-6249-4ae8-8ecb-9316ee654540-cni-bin-dir\") pod \"calico-node-h4vml\" (UID: \"95d70a92-6249-4ae8-8ecb-9316ee654540\") " pod="calico-system/calico-node-h4vml" Jul 10 00:23:14.788953 kubelet[1455]: I0710 00:23:14.788924 1455 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/95d70a92-6249-4ae8-8ecb-9316ee654540-xtables-lock\") pod \"calico-node-h4vml\" (UID: \"95d70a92-6249-4ae8-8ecb-9316ee654540\") " pod="calico-system/calico-node-h4vml" Jul 10 00:23:14.788953 kubelet[1455]: I0710 00:23:14.788950 1455 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/ac010dd4-3be4-467e-b5c3-63ff2bfb42e5-socket-dir\") pod \"csi-node-driver-bb72p\" (UID: \"ac010dd4-3be4-467e-b5c3-63ff2bfb42e5\") " pod="calico-system/csi-node-driver-bb72p" Jul 10 00:23:14.788997 kubelet[1455]: I0710 00:23:14.788965 1455 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/056495b9-abd3-48d4-8c52-d92102d487a0-xtables-lock\") pod \"kube-proxy-pnzwq\" (UID: \"056495b9-abd3-48d4-8c52-d92102d487a0\") " pod="kube-system/kube-proxy-pnzwq" Jul 10 00:23:14.788997 kubelet[1455]: I0710 00:23:14.788982 1455 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/95d70a92-6249-4ae8-8ecb-9316ee654540-flexvol-driver-host\") pod \"calico-node-h4vml\" (UID: \"95d70a92-6249-4ae8-8ecb-9316ee654540\") " pod="calico-system/calico-node-h4vml" Jul 10 00:23:14.789041 kubelet[1455]: I0710 00:23:14.789002 1455 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/95d70a92-6249-4ae8-8ecb-9316ee654540-node-certs\") pod \"calico-node-h4vml\" (UID: \"95d70a92-6249-4ae8-8ecb-9316ee654540\") " pod="calico-system/calico-node-h4vml" Jul 10 00:23:14.890137 kubelet[1455]: E0710 00:23:14.890096 1455 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 10 00:23:14.890137 kubelet[1455]: W0710 00:23:14.890128 1455 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 10 00:23:14.890306 kubelet[1455]: E0710 00:23:14.890155 1455 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 10 00:23:14.890331 kubelet[1455]: E0710 00:23:14.890313 1455 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 10 00:23:14.890331 kubelet[1455]: W0710 00:23:14.890322 1455 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 10 00:23:14.890370 kubelet[1455]: E0710 00:23:14.890336 1455 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 10 00:23:14.890564 kubelet[1455]: E0710 00:23:14.890543 1455 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 10 00:23:14.890564 kubelet[1455]: W0710 00:23:14.890554 1455 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 10 00:23:14.890564 kubelet[1455]: E0710 00:23:14.890567 1455 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 10 00:23:14.890827 kubelet[1455]: E0710 00:23:14.890816 1455 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 10 00:23:14.890827 kubelet[1455]: W0710 00:23:14.890827 1455 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 10 00:23:14.890878 kubelet[1455]: E0710 00:23:14.890848 1455 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 10 00:23:14.891020 kubelet[1455]: E0710 00:23:14.891010 1455 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 10 00:23:14.891050 kubelet[1455]: W0710 00:23:14.891020 1455 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 10 00:23:14.891050 kubelet[1455]: E0710 00:23:14.891033 1455 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 10 00:23:14.891197 kubelet[1455]: E0710 00:23:14.891186 1455 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 10 00:23:14.891227 kubelet[1455]: W0710 00:23:14.891196 1455 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 10 00:23:14.891253 kubelet[1455]: E0710 00:23:14.891233 1455 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 10 00:23:14.891348 kubelet[1455]: E0710 00:23:14.891336 1455 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 10 00:23:14.891380 kubelet[1455]: W0710 00:23:14.891350 1455 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 10 00:23:14.891416 kubelet[1455]: E0710 00:23:14.891381 1455 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 10 00:23:14.891488 kubelet[1455]: E0710 00:23:14.891478 1455 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 10 00:23:14.891488 kubelet[1455]: W0710 00:23:14.891488 1455 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 10 00:23:14.891557 kubelet[1455]: E0710 00:23:14.891516 1455 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 10 00:23:14.891616 kubelet[1455]: E0710 00:23:14.891607 1455 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 10 00:23:14.891646 kubelet[1455]: W0710 00:23:14.891616 1455 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 10 00:23:14.891683 kubelet[1455]: E0710 00:23:14.891650 1455 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 10 00:23:14.891760 kubelet[1455]: E0710 00:23:14.891751 1455 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 10 00:23:14.891797 kubelet[1455]: W0710 00:23:14.891763 1455 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 10 00:23:14.891797 kubelet[1455]: E0710 00:23:14.891786 1455 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 10 00:23:14.891899 kubelet[1455]: E0710 00:23:14.891889 1455 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 10 00:23:14.891930 kubelet[1455]: W0710 00:23:14.891899 1455 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 10 00:23:14.891930 kubelet[1455]: E0710 00:23:14.891923 1455 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 10 00:23:14.892033 kubelet[1455]: E0710 00:23:14.892024 1455 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 10 00:23:14.892033 kubelet[1455]: W0710 00:23:14.892033 1455 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 10 00:23:14.892096 kubelet[1455]: E0710 00:23:14.892053 1455 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 10 00:23:14.892162 kubelet[1455]: E0710 00:23:14.892153 1455 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 10 00:23:14.892193 kubelet[1455]: W0710 00:23:14.892162 1455 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 10 00:23:14.892193 kubelet[1455]: E0710 00:23:14.892184 1455 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 10 00:23:14.892296 kubelet[1455]: E0710 00:23:14.892287 1455 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 10 00:23:14.892331 kubelet[1455]: W0710 00:23:14.892317 1455 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 10 00:23:14.892360 kubelet[1455]: E0710 00:23:14.892336 1455 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 10 00:23:14.892451 kubelet[1455]: E0710 00:23:14.892437 1455 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 10 00:23:14.892493 kubelet[1455]: W0710 00:23:14.892455 1455 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 10 00:23:14.892493 kubelet[1455]: E0710 00:23:14.892473 1455 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 10 00:23:14.892589 kubelet[1455]: E0710 00:23:14.892579 1455 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 10 00:23:14.892623 kubelet[1455]: W0710 00:23:14.892592 1455 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 10 00:23:14.892623 kubelet[1455]: E0710 00:23:14.892612 1455 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 10 00:23:14.892737 kubelet[1455]: E0710 00:23:14.892727 1455 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 10 00:23:14.892737 kubelet[1455]: W0710 00:23:14.892737 1455 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 10 00:23:14.892794 kubelet[1455]: E0710 00:23:14.892756 1455 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 10 00:23:14.892874 kubelet[1455]: E0710 00:23:14.892864 1455 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 10 00:23:14.892912 kubelet[1455]: W0710 00:23:14.892874 1455 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 10 00:23:14.892912 kubelet[1455]: E0710 00:23:14.892892 1455 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 10 00:23:14.893008 kubelet[1455]: E0710 00:23:14.892999 1455 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 10 00:23:14.893008 kubelet[1455]: W0710 00:23:14.893007 1455 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 10 00:23:14.893067 kubelet[1455]: E0710 00:23:14.893025 1455 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 10 00:23:14.893132 kubelet[1455]: E0710 00:23:14.893124 1455 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 10 00:23:14.893132 kubelet[1455]: W0710 00:23:14.893133 1455 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 10 00:23:14.893195 kubelet[1455]: E0710 00:23:14.893151 1455 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 10 00:23:14.893261 kubelet[1455]: E0710 00:23:14.893252 1455 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 10 00:23:14.893261 kubelet[1455]: W0710 00:23:14.893260 1455 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 10 00:23:14.893322 kubelet[1455]: E0710 00:23:14.893277 1455 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 10 00:23:14.893385 kubelet[1455]: E0710 00:23:14.893376 1455 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 10 00:23:14.893385 kubelet[1455]: W0710 00:23:14.893385 1455 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 10 00:23:14.893462 kubelet[1455]: E0710 00:23:14.893401 1455 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 10 00:23:14.893533 kubelet[1455]: E0710 00:23:14.893523 1455 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 10 00:23:14.893533 kubelet[1455]: W0710 00:23:14.893532 1455 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 10 00:23:14.893590 kubelet[1455]: E0710 00:23:14.893550 1455 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 10 00:23:14.893663 kubelet[1455]: E0710 00:23:14.893654 1455 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 10 00:23:14.893700 kubelet[1455]: W0710 00:23:14.893663 1455 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 10 00:23:14.893700 kubelet[1455]: E0710 00:23:14.893690 1455 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 10 00:23:14.893810 kubelet[1455]: E0710 00:23:14.893800 1455 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 10 00:23:14.893810 kubelet[1455]: W0710 00:23:14.893809 1455 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 10 00:23:14.893868 kubelet[1455]: E0710 00:23:14.893827 1455 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 10 00:23:14.893945 kubelet[1455]: E0710 00:23:14.893935 1455 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 10 00:23:14.893945 kubelet[1455]: W0710 00:23:14.893944 1455 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 10 00:23:14.894006 kubelet[1455]: E0710 00:23:14.893960 1455 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 10 00:23:14.894068 kubelet[1455]: E0710 00:23:14.894059 1455 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 10 00:23:14.894068 kubelet[1455]: W0710 00:23:14.894067 1455 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 10 00:23:14.894128 kubelet[1455]: E0710 00:23:14.894083 1455 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 10 00:23:14.894197 kubelet[1455]: E0710 00:23:14.894187 1455 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 10 00:23:14.894197 kubelet[1455]: W0710 00:23:14.894196 1455 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 10 00:23:14.894260 kubelet[1455]: E0710 00:23:14.894212 1455 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 10 00:23:14.894331 kubelet[1455]: E0710 00:23:14.894321 1455 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 10 00:23:14.894331 kubelet[1455]: W0710 00:23:14.894330 1455 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 10 00:23:14.894389 kubelet[1455]: E0710 00:23:14.894348 1455 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 10 00:23:14.894496 kubelet[1455]: E0710 00:23:14.894485 1455 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 10 00:23:14.894496 kubelet[1455]: W0710 00:23:14.894495 1455 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 10 00:23:14.894553 kubelet[1455]: E0710 00:23:14.894512 1455 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 10 00:23:14.894624 kubelet[1455]: E0710 00:23:14.894615 1455 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 10 00:23:14.894624 kubelet[1455]: W0710 00:23:14.894624 1455 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 10 00:23:14.894738 kubelet[1455]: E0710 00:23:14.894640 1455 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 10 00:23:14.894767 kubelet[1455]: E0710 00:23:14.894743 1455 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 10 00:23:14.894767 kubelet[1455]: W0710 00:23:14.894752 1455 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 10 00:23:14.894807 kubelet[1455]: E0710 00:23:14.894773 1455 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 10 00:23:14.894880 kubelet[1455]: E0710 00:23:14.894871 1455 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 10 00:23:14.894880 kubelet[1455]: W0710 00:23:14.894880 1455 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 10 00:23:14.894944 kubelet[1455]: E0710 00:23:14.894898 1455 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 10 00:23:14.895008 kubelet[1455]: E0710 00:23:14.894999 1455 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 10 00:23:14.895008 kubelet[1455]: W0710 00:23:14.895008 1455 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 10 00:23:14.895067 kubelet[1455]: E0710 00:23:14.895025 1455 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 10 00:23:14.895134 kubelet[1455]: E0710 00:23:14.895124 1455 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 10 00:23:14.895134 kubelet[1455]: W0710 00:23:14.895133 1455 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 10 00:23:14.895196 kubelet[1455]: E0710 00:23:14.895151 1455 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 10 00:23:14.895257 kubelet[1455]: E0710 00:23:14.895247 1455 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 10 00:23:14.895257 kubelet[1455]: W0710 00:23:14.895257 1455 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 10 00:23:14.895315 kubelet[1455]: E0710 00:23:14.895274 1455 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 10 00:23:14.895383 kubelet[1455]: E0710 00:23:14.895374 1455 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 10 00:23:14.895383 kubelet[1455]: W0710 00:23:14.895382 1455 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 10 00:23:14.895475 kubelet[1455]: E0710 00:23:14.895400 1455 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 10 00:23:14.895544 kubelet[1455]: E0710 00:23:14.895534 1455 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 10 00:23:14.895544 kubelet[1455]: W0710 00:23:14.895544 1455 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 10 00:23:14.895600 kubelet[1455]: E0710 00:23:14.895563 1455 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 10 00:23:14.895680 kubelet[1455]: E0710 00:23:14.895663 1455 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 10 00:23:14.895680 kubelet[1455]: W0710 00:23:14.895679 1455 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 10 00:23:14.895741 kubelet[1455]: E0710 00:23:14.895698 1455 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 10 00:23:14.895819 kubelet[1455]: E0710 00:23:14.895809 1455 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 10 00:23:14.895819 kubelet[1455]: W0710 00:23:14.895819 1455 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 10 00:23:14.895896 kubelet[1455]: E0710 00:23:14.895845 1455 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 10 00:23:14.895986 kubelet[1455]: E0710 00:23:14.895977 1455 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 10 00:23:14.895986 kubelet[1455]: W0710 00:23:14.895986 1455 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 10 00:23:14.896087 kubelet[1455]: E0710 00:23:14.896069 1455 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 10 00:23:14.896148 kubelet[1455]: E0710 00:23:14.896134 1455 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 10 00:23:14.896148 kubelet[1455]: W0710 00:23:14.896144 1455 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 10 00:23:14.896198 kubelet[1455]: E0710 00:23:14.896167 1455 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 10 00:23:14.896293 kubelet[1455]: E0710 00:23:14.896282 1455 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 10 00:23:14.896293 kubelet[1455]: W0710 00:23:14.896292 1455 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 10 00:23:14.896393 kubelet[1455]: E0710 00:23:14.896379 1455 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 10 00:23:14.896473 kubelet[1455]: E0710 00:23:14.896459 1455 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 10 00:23:14.896473 kubelet[1455]: W0710 00:23:14.896471 1455 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 10 00:23:14.896562 kubelet[1455]: E0710 00:23:14.896549 1455 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 10 00:23:14.896652 kubelet[1455]: E0710 00:23:14.896635 1455 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 10 00:23:14.896652 kubelet[1455]: W0710 00:23:14.896647 1455 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 10 00:23:14.896731 kubelet[1455]: E0710 00:23:14.896675 1455 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 10 00:23:14.896808 kubelet[1455]: E0710 00:23:14.896791 1455 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 10 00:23:14.896808 kubelet[1455]: W0710 00:23:14.896803 1455 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 10 00:23:14.896862 kubelet[1455]: E0710 00:23:14.896822 1455 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 10 00:23:14.897014 kubelet[1455]: E0710 00:23:14.896994 1455 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 10 00:23:14.897014 kubelet[1455]: W0710 00:23:14.897008 1455 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 10 00:23:14.897082 kubelet[1455]: E0710 00:23:14.897027 1455 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 10 00:23:14.897170 kubelet[1455]: E0710 00:23:14.897153 1455 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 10 00:23:14.897170 kubelet[1455]: W0710 00:23:14.897163 1455 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 10 00:23:14.897224 kubelet[1455]: E0710 00:23:14.897185 1455 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 10 00:23:14.897261 kubelet[1455]: I0710 00:23:14.897156 1455 swap_util.go:74] "error creating dir to test if tmpfs noswap is enabled. Assuming not supported" mount path="" error="stat /var/lib/kubelet/plugins/kubernetes.io/empty-dir: no such file or directory" Jul 10 00:23:14.897326 kubelet[1455]: E0710 00:23:14.897310 1455 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 10 00:23:14.897363 kubelet[1455]: W0710 00:23:14.897321 1455 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 10 00:23:14.897400 kubelet[1455]: E0710 00:23:14.897382 1455 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 10 00:23:14.897559 kubelet[1455]: E0710 00:23:14.897543 1455 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 10 00:23:14.897559 kubelet[1455]: W0710 00:23:14.897557 1455 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 10 00:23:14.897642 kubelet[1455]: E0710 00:23:14.897580 1455 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 10 00:23:14.897740 kubelet[1455]: E0710 00:23:14.897728 1455 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 10 00:23:14.897740 kubelet[1455]: W0710 00:23:14.897739 1455 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 10 00:23:14.897821 kubelet[1455]: E0710 00:23:14.897803 1455 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 10 00:23:14.897894 kubelet[1455]: E0710 00:23:14.897883 1455 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 10 00:23:14.897923 kubelet[1455]: W0710 00:23:14.897894 1455 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 10 00:23:14.897923 kubelet[1455]: E0710 00:23:14.897918 1455 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 10 00:23:14.898080 kubelet[1455]: E0710 00:23:14.898067 1455 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 10 00:23:14.898109 kubelet[1455]: W0710 00:23:14.898080 1455 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 10 00:23:14.898109 kubelet[1455]: E0710 00:23:14.898097 1455 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 10 00:23:14.898297 kubelet[1455]: E0710 00:23:14.898282 1455 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 10 00:23:14.898334 kubelet[1455]: W0710 00:23:14.898297 1455 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 10 00:23:14.898334 kubelet[1455]: E0710 00:23:14.898309 1455 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 10 00:23:14.902970 kubelet[1455]: E0710 00:23:14.902953 1455 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 10 00:23:14.903055 kubelet[1455]: W0710 00:23:14.903042 1455 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 10 00:23:14.903112 kubelet[1455]: E0710 00:23:14.903100 1455 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 10 00:23:14.903917 kubelet[1455]: E0710 00:23:14.903901 1455 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 10 00:23:14.903917 kubelet[1455]: W0710 00:23:14.903915 1455 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 10 00:23:14.903993 kubelet[1455]: E0710 00:23:14.903926 1455 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 10 00:23:14.908107 kubelet[1455]: E0710 00:23:14.908090 1455 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 10 00:23:14.908189 kubelet[1455]: W0710 00:23:14.908176 1455 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 10 00:23:14.908249 kubelet[1455]: E0710 00:23:14.908239 1455 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 10 00:23:14.908458 kubelet[1455]: E0710 00:23:14.908439 1455 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 10 00:23:14.908527 kubelet[1455]: W0710 00:23:14.908515 1455 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 10 00:23:14.908581 kubelet[1455]: E0710 00:23:14.908570 1455 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 10 00:23:15.082640 env[1217]: time="2025-07-10T00:23:15.081186126Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-h4vml,Uid:95d70a92-6249-4ae8-8ecb-9316ee654540,Namespace:calico-system,Attempt:0,}" Jul 10 00:23:15.082924 kubelet[1455]: E0710 00:23:15.082900 1455 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Jul 10 00:23:15.085374 env[1217]: time="2025-07-10T00:23:15.085218126Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-pnzwq,Uid:056495b9-abd3-48d4-8c52-d92102d487a0,Namespace:kube-system,Attempt:0,}" Jul 10 00:23:15.714988 env[1217]: time="2025-07-10T00:23:15.714943646Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 10 00:23:15.716521 env[1217]: time="2025-07-10T00:23:15.716481446Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 10 00:23:15.717515 env[1217]: time="2025-07-10T00:23:15.717492726Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7d46a07936af93fcce097459055f93ab07331509aa55f4a2a90d95a3ace1850e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 10 00:23:15.718935 env[1217]: time="2025-07-10T00:23:15.718904686Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:7d46a07936af93fcce097459055f93ab07331509aa55f4a2a90d95a3ace1850e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 10 00:23:15.720365 env[1217]: time="2025-07-10T00:23:15.720335246Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 10 00:23:15.722541 env[1217]: time="2025-07-10T00:23:15.722516726Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 10 00:23:15.723258 env[1217]: time="2025-07-10T00:23:15.723231046Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 10 00:23:15.725736 env[1217]: time="2025-07-10T00:23:15.725705726Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 10 00:23:15.764016 env[1217]: time="2025-07-10T00:23:15.763775486Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 10 00:23:15.764016 env[1217]: time="2025-07-10T00:23:15.763813166Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 10 00:23:15.764016 env[1217]: time="2025-07-10T00:23:15.763823526Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 10 00:23:15.764219 env[1217]: time="2025-07-10T00:23:15.764029446Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/67bc978a79fabf84d0af4da93473008d57a1ee9bf4c79c1ac3d7a807b6165740 pid=1577 runtime=io.containerd.runc.v2 Jul 10 00:23:15.764462 env[1217]: time="2025-07-10T00:23:15.764411766Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 10 00:23:15.764462 env[1217]: time="2025-07-10T00:23:15.764441326Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 10 00:23:15.764519 env[1217]: time="2025-07-10T00:23:15.764461326Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 10 00:23:15.764656 env[1217]: time="2025-07-10T00:23:15.764605366Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/2c9892c511ab53dc7c1c7af249db69a287ef72c7b49eebf8a847e08f01f2b561 pid=1578 runtime=io.containerd.runc.v2 Jul 10 00:23:15.770616 kubelet[1455]: E0710 00:23:15.770214 1455 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 00:23:15.791438 systemd[1]: Started cri-containerd-2c9892c511ab53dc7c1c7af249db69a287ef72c7b49eebf8a847e08f01f2b561.scope. Jul 10 00:23:15.792539 systemd[1]: Started cri-containerd-67bc978a79fabf84d0af4da93473008d57a1ee9bf4c79c1ac3d7a807b6165740.scope. Jul 10 00:23:15.832000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:15.832000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:15.832000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:15.832000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:15.832000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:15.832000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:15.832000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:15.832000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:15.832000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:15.832000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:15.832000 audit: BPF prog-id=55 op=LOAD Jul 10 00:23:15.833000 audit[1595]: AVC avc: denied { bpf } for pid=1595 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:15.833000 audit[1595]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=1577 pid=1595 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:23:15.833000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3637626339373861373966616266383464306166346461393334373330 Jul 10 00:23:15.833000 audit[1595]: AVC avc: denied { perfmon } for pid=1595 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:15.833000 audit[1595]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=1577 pid=1595 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:23:15.833000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3637626339373861373966616266383464306166346461393334373330 Jul 10 00:23:15.833000 audit[1595]: AVC avc: denied { bpf } for pid=1595 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:15.833000 audit[1595]: AVC avc: denied { bpf } for pid=1595 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:15.833000 audit[1595]: AVC avc: denied { bpf } for pid=1595 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:15.833000 audit[1595]: AVC avc: denied { perfmon } for pid=1595 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:15.833000 audit[1595]: AVC avc: denied { perfmon } for pid=1595 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:15.833000 audit[1595]: AVC avc: denied { perfmon } for pid=1595 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:15.833000 audit[1595]: AVC avc: denied { perfmon } for pid=1595 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:15.833000 audit[1595]: AVC avc: denied { perfmon } for pid=1595 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:15.833000 audit[1595]: AVC avc: denied { bpf } for pid=1595 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:15.833000 audit[1595]: AVC avc: denied { bpf } for pid=1595 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:15.833000 audit: BPF prog-id=56 op=LOAD Jul 10 00:23:15.833000 audit[1595]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=1577 pid=1595 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:23:15.833000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3637626339373861373966616266383464306166346461393334373330 Jul 10 00:23:15.833000 audit[1595]: AVC avc: denied { bpf } for pid=1595 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:15.833000 audit[1595]: AVC avc: denied { bpf } for pid=1595 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:15.833000 audit[1595]: AVC avc: denied { perfmon } for pid=1595 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:15.833000 audit[1595]: AVC avc: denied { perfmon } for pid=1595 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:15.833000 audit[1595]: AVC avc: denied { perfmon } for pid=1595 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:15.833000 audit[1595]: AVC avc: denied { perfmon } for pid=1595 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:15.833000 audit[1595]: AVC avc: denied { perfmon } for pid=1595 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:15.833000 audit[1595]: AVC avc: denied { bpf } for pid=1595 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:15.833000 audit[1595]: AVC avc: denied { bpf } for pid=1595 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:15.833000 audit: BPF prog-id=57 op=LOAD Jul 10 00:23:15.833000 audit[1595]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=1577 pid=1595 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:23:15.833000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3637626339373861373966616266383464306166346461393334373330 Jul 10 00:23:15.833000 audit: BPF prog-id=57 op=UNLOAD Jul 10 00:23:15.833000 audit: BPF prog-id=56 op=UNLOAD Jul 10 00:23:15.833000 audit[1595]: AVC avc: denied { bpf } for pid=1595 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:15.833000 audit[1595]: AVC avc: denied { bpf } for pid=1595 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:15.833000 audit[1595]: AVC avc: denied { bpf } for pid=1595 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:15.833000 audit[1595]: AVC avc: denied { perfmon } for pid=1595 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:15.833000 audit[1595]: AVC avc: denied { perfmon } for pid=1595 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:15.833000 audit[1595]: AVC avc: denied { perfmon } for pid=1595 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:15.833000 audit[1595]: AVC avc: denied { perfmon } for pid=1595 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:15.833000 audit[1595]: AVC avc: denied { perfmon } for pid=1595 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:15.833000 audit[1595]: AVC avc: denied { bpf } for pid=1595 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:15.833000 audit[1595]: AVC avc: denied { bpf } for pid=1595 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:15.833000 audit: BPF prog-id=58 op=LOAD Jul 10 00:23:15.833000 audit[1595]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=1577 pid=1595 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:23:15.833000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3637626339373861373966616266383464306166346461393334373330 Jul 10 00:23:15.834000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:15.834000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:15.834000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:15.834000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:15.834000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:15.834000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:15.834000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:15.834000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:15.834000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:15.834000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:15.834000 audit: BPF prog-id=59 op=LOAD Jul 10 00:23:15.834000 audit[1596]: AVC avc: denied { bpf } for pid=1596 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:15.834000 audit[1596]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=1578 pid=1596 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:23:15.834000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3263393839326335313161623533646337633163376166323439646236 Jul 10 00:23:15.834000 audit[1596]: AVC avc: denied { perfmon } for pid=1596 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:15.834000 audit[1596]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=1578 pid=1596 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:23:15.834000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3263393839326335313161623533646337633163376166323439646236 Jul 10 00:23:15.834000 audit[1596]: AVC avc: denied { bpf } for pid=1596 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:15.834000 audit[1596]: AVC avc: denied { bpf } for pid=1596 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:15.834000 audit[1596]: AVC avc: denied { bpf } for pid=1596 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:15.834000 audit[1596]: AVC avc: denied { perfmon } for pid=1596 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:15.834000 audit[1596]: AVC avc: denied { perfmon } for pid=1596 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:15.834000 audit[1596]: AVC avc: denied { perfmon } for pid=1596 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:15.834000 audit[1596]: AVC avc: denied { perfmon } for pid=1596 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:15.834000 audit[1596]: AVC avc: denied { perfmon } for pid=1596 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:15.834000 audit[1596]: AVC avc: denied { bpf } for pid=1596 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:15.834000 audit[1596]: AVC avc: denied { bpf } for pid=1596 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:15.834000 audit: BPF prog-id=60 op=LOAD Jul 10 00:23:15.834000 audit[1596]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=1578 pid=1596 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:23:15.834000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3263393839326335313161623533646337633163376166323439646236 Jul 10 00:23:15.834000 audit[1596]: AVC avc: denied { bpf } for pid=1596 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:15.834000 audit[1596]: AVC avc: denied { bpf } for pid=1596 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:15.834000 audit[1596]: AVC avc: denied { perfmon } for pid=1596 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:15.834000 audit[1596]: AVC avc: denied { perfmon } for pid=1596 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:15.834000 audit[1596]: AVC avc: denied { perfmon } for pid=1596 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:15.834000 audit[1596]: AVC avc: denied { perfmon } for pid=1596 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:15.834000 audit[1596]: AVC avc: denied { perfmon } for pid=1596 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:15.834000 audit[1596]: AVC avc: denied { bpf } for pid=1596 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:15.834000 audit[1596]: AVC avc: denied { bpf } for pid=1596 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:15.834000 audit: BPF prog-id=61 op=LOAD Jul 10 00:23:15.834000 audit[1596]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=1578 pid=1596 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:23:15.834000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3263393839326335313161623533646337633163376166323439646236 Jul 10 00:23:15.834000 audit: BPF prog-id=61 op=UNLOAD Jul 10 00:23:15.834000 audit: BPF prog-id=60 op=UNLOAD Jul 10 00:23:15.834000 audit[1596]: AVC avc: denied { bpf } for pid=1596 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:15.834000 audit[1596]: AVC avc: denied { bpf } for pid=1596 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:15.834000 audit[1596]: AVC avc: denied { bpf } for pid=1596 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:15.834000 audit[1596]: AVC avc: denied { perfmon } for pid=1596 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:15.834000 audit[1596]: AVC avc: denied { perfmon } for pid=1596 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:15.834000 audit[1596]: AVC avc: denied { perfmon } for pid=1596 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:15.834000 audit[1596]: AVC avc: denied { perfmon } for pid=1596 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:15.834000 audit[1596]: AVC avc: denied { perfmon } for pid=1596 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:15.834000 audit[1596]: AVC avc: denied { bpf } for pid=1596 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:15.834000 audit[1596]: AVC avc: denied { bpf } for pid=1596 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:15.834000 audit: BPF prog-id=62 op=LOAD Jul 10 00:23:15.834000 audit[1596]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=1578 pid=1596 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:23:15.834000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3263393839326335313161623533646337633163376166323439646236 Jul 10 00:23:15.853573 env[1217]: time="2025-07-10T00:23:15.852710366Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-h4vml,Uid:95d70a92-6249-4ae8-8ecb-9316ee654540,Namespace:calico-system,Attempt:0,} returns sandbox id \"67bc978a79fabf84d0af4da93473008d57a1ee9bf4c79c1ac3d7a807b6165740\"" Jul 10 00:23:15.853573 env[1217]: time="2025-07-10T00:23:15.852750246Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-pnzwq,Uid:056495b9-abd3-48d4-8c52-d92102d487a0,Namespace:kube-system,Attempt:0,} returns sandbox id \"2c9892c511ab53dc7c1c7af249db69a287ef72c7b49eebf8a847e08f01f2b561\"" Jul 10 00:23:15.854721 kubelet[1455]: E0710 00:23:15.854585 1455 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Jul 10 00:23:15.855192 env[1217]: time="2025-07-10T00:23:15.855157006Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.2\"" Jul 10 00:23:15.903432 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3692076516.mount: Deactivated successfully. Jul 10 00:23:16.771349 kubelet[1455]: E0710 00:23:16.771317 1455 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 00:23:16.933082 kubelet[1455]: E0710 00:23:16.933043 1455 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-bb72p" podUID="ac010dd4-3be4-467e-b5c3-63ff2bfb42e5" Jul 10 00:23:17.069018 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3330750735.mount: Deactivated successfully. Jul 10 00:23:17.158067 env[1217]: time="2025-07-10T00:23:17.158009966Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 10 00:23:17.159780 env[1217]: time="2025-07-10T00:23:17.159752606Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:53f638101e3d73f7dd5e42dc42fb3d94ae1978e8958677222c3de6ec1d8c3d4f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 10 00:23:17.161115 env[1217]: time="2025-07-10T00:23:17.161071086Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 10 00:23:17.162079 env[1217]: time="2025-07-10T00:23:17.162045286Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:972be127eaecd7d1a2d5393b8d14f1ae8f88550bee83e0519e9590c7e15eb41b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 10 00:23:17.163046 env[1217]: time="2025-07-10T00:23:17.163014446Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.2\" returns image reference \"sha256:53f638101e3d73f7dd5e42dc42fb3d94ae1978e8958677222c3de6ec1d8c3d4f\"" Jul 10 00:23:17.164319 env[1217]: time="2025-07-10T00:23:17.164116886Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.32.6\"" Jul 10 00:23:17.165703 env[1217]: time="2025-07-10T00:23:17.165671406Z" level=info msg="CreateContainer within sandbox \"67bc978a79fabf84d0af4da93473008d57a1ee9bf4c79c1ac3d7a807b6165740\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Jul 10 00:23:17.178069 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3870390894.mount: Deactivated successfully. Jul 10 00:23:17.181813 env[1217]: time="2025-07-10T00:23:17.181778166Z" level=info msg="CreateContainer within sandbox \"67bc978a79fabf84d0af4da93473008d57a1ee9bf4c79c1ac3d7a807b6165740\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"fa2b476ed8e66dac5c0ca5b721b2d8f00cf889942e0e6e0b151e4c4c574df074\"" Jul 10 00:23:17.182491 env[1217]: time="2025-07-10T00:23:17.182463166Z" level=info msg="StartContainer for \"fa2b476ed8e66dac5c0ca5b721b2d8f00cf889942e0e6e0b151e4c4c574df074\"" Jul 10 00:23:17.201840 systemd[1]: Started cri-containerd-fa2b476ed8e66dac5c0ca5b721b2d8f00cf889942e0e6e0b151e4c4c574df074.scope. Jul 10 00:23:17.223000 audit[1651]: AVC avc: denied { perfmon } for pid=1651 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:17.226262 kernel: kauditd_printk_skb: 357 callbacks suppressed Jul 10 00:23:17.226335 kernel: audit: type=1400 audit(1752106997.223:456): avc: denied { perfmon } for pid=1651 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:17.226359 kernel: audit: type=1300 audit(1752106997.223:456): arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=1577 pid=1651 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:23:17.223000 audit[1651]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=1577 pid=1651 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:23:17.223000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6661326234373665643865363664616335633063613562373231623264 Jul 10 00:23:17.231530 kernel: audit: type=1327 audit(1752106997.223:456): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6661326234373665643865363664616335633063613562373231623264 Jul 10 00:23:17.231593 kernel: audit: type=1400 audit(1752106997.223:457): avc: denied { bpf } for pid=1651 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:17.223000 audit[1651]: AVC avc: denied { bpf } for pid=1651 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:17.233485 kernel: audit: type=1400 audit(1752106997.223:457): avc: denied { bpf } for pid=1651 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:17.223000 audit[1651]: AVC avc: denied { bpf } for pid=1651 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:17.223000 audit[1651]: AVC avc: denied { bpf } for pid=1651 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:17.223000 audit[1651]: AVC avc: denied { perfmon } for pid=1651 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:17.239808 kernel: audit: type=1400 audit(1752106997.223:457): avc: denied { bpf } for pid=1651 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:17.239869 kernel: audit: type=1400 audit(1752106997.223:457): avc: denied { perfmon } for pid=1651 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:17.239893 kernel: audit: type=1400 audit(1752106997.223:457): avc: denied { perfmon } for pid=1651 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:17.223000 audit[1651]: AVC avc: denied { perfmon } for pid=1651 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:17.223000 audit[1651]: AVC avc: denied { perfmon } for pid=1651 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:17.243799 kernel: audit: type=1400 audit(1752106997.223:457): avc: denied { perfmon } for pid=1651 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:17.243872 kernel: audit: type=1400 audit(1752106997.223:457): avc: denied { perfmon } for pid=1651 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:17.223000 audit[1651]: AVC avc: denied { perfmon } for pid=1651 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:17.223000 audit[1651]: AVC avc: denied { perfmon } for pid=1651 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:17.223000 audit[1651]: AVC avc: denied { bpf } for pid=1651 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:17.223000 audit[1651]: AVC avc: denied { bpf } for pid=1651 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:17.223000 audit: BPF prog-id=63 op=LOAD Jul 10 00:23:17.223000 audit[1651]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=1577 pid=1651 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:23:17.223000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6661326234373665643865363664616335633063613562373231623264 Jul 10 00:23:17.224000 audit[1651]: AVC avc: denied { bpf } for pid=1651 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:17.224000 audit[1651]: AVC avc: denied { bpf } for pid=1651 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:17.224000 audit[1651]: AVC avc: denied { perfmon } for pid=1651 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:17.224000 audit[1651]: AVC avc: denied { perfmon } for pid=1651 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:17.224000 audit[1651]: AVC avc: denied { perfmon } for pid=1651 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:17.224000 audit[1651]: AVC avc: denied { perfmon } for pid=1651 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:17.224000 audit[1651]: AVC avc: denied { perfmon } for pid=1651 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:17.224000 audit[1651]: AVC avc: denied { bpf } for pid=1651 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:17.224000 audit[1651]: AVC avc: denied { bpf } for pid=1651 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:17.224000 audit: BPF prog-id=64 op=LOAD Jul 10 00:23:17.224000 audit[1651]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=1577 pid=1651 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:23:17.224000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6661326234373665643865363664616335633063613562373231623264 Jul 10 00:23:17.226000 audit: BPF prog-id=64 op=UNLOAD Jul 10 00:23:17.226000 audit: BPF prog-id=63 op=UNLOAD Jul 10 00:23:17.226000 audit[1651]: AVC avc: denied { bpf } for pid=1651 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:17.226000 audit[1651]: AVC avc: denied { bpf } for pid=1651 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:17.226000 audit[1651]: AVC avc: denied { bpf } for pid=1651 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:17.226000 audit[1651]: AVC avc: denied { perfmon } for pid=1651 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:17.226000 audit[1651]: AVC avc: denied { perfmon } for pid=1651 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:17.226000 audit[1651]: AVC avc: denied { perfmon } for pid=1651 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:17.226000 audit[1651]: AVC avc: denied { perfmon } for pid=1651 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:17.226000 audit[1651]: AVC avc: denied { perfmon } for pid=1651 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:17.226000 audit[1651]: AVC avc: denied { bpf } for pid=1651 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:17.226000 audit[1651]: AVC avc: denied { bpf } for pid=1651 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:17.226000 audit: BPF prog-id=65 op=LOAD Jul 10 00:23:17.226000 audit[1651]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=1577 pid=1651 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:23:17.226000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6661326234373665643865363664616335633063613562373231623264 Jul 10 00:23:17.253274 env[1217]: time="2025-07-10T00:23:17.253225126Z" level=info msg="StartContainer for \"fa2b476ed8e66dac5c0ca5b721b2d8f00cf889942e0e6e0b151e4c4c574df074\" returns successfully" Jul 10 00:23:17.265973 systemd[1]: cri-containerd-fa2b476ed8e66dac5c0ca5b721b2d8f00cf889942e0e6e0b151e4c4c574df074.scope: Deactivated successfully. Jul 10 00:23:17.271000 audit: BPF prog-id=65 op=UNLOAD Jul 10 00:23:17.312404 env[1217]: time="2025-07-10T00:23:17.312338606Z" level=info msg="shim disconnected" id=fa2b476ed8e66dac5c0ca5b721b2d8f00cf889942e0e6e0b151e4c4c574df074 Jul 10 00:23:17.312404 env[1217]: time="2025-07-10T00:23:17.312393726Z" level=warning msg="cleaning up after shim disconnected" id=fa2b476ed8e66dac5c0ca5b721b2d8f00cf889942e0e6e0b151e4c4c574df074 namespace=k8s.io Jul 10 00:23:17.312404 env[1217]: time="2025-07-10T00:23:17.312403526Z" level=info msg="cleaning up dead shim" Jul 10 00:23:17.318968 env[1217]: time="2025-07-10T00:23:17.318915926Z" level=warning msg="cleanup warnings time=\"2025-07-10T00:23:17Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=1690 runtime=io.containerd.runc.v2\n" Jul 10 00:23:17.771918 kubelet[1455]: E0710 00:23:17.771856 1455 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 00:23:18.035853 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-fa2b476ed8e66dac5c0ca5b721b2d8f00cf889942e0e6e0b151e4c4c574df074-rootfs.mount: Deactivated successfully. Jul 10 00:23:18.300990 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount266282077.mount: Deactivated successfully. Jul 10 00:23:18.772378 kubelet[1455]: E0710 00:23:18.772263 1455 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 00:23:18.773964 env[1217]: time="2025-07-10T00:23:18.773919526Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.32.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 10 00:23:18.775895 env[1217]: time="2025-07-10T00:23:18.775857286Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:e29293ef7b817bb7b03ce7484edafe6ca0a7087e54074e7d7dcd3bd3c762eee9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 10 00:23:18.777519 env[1217]: time="2025-07-10T00:23:18.777490926Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.32.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 10 00:23:18.779073 env[1217]: time="2025-07-10T00:23:18.779042606Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:b13d9da413b983d130bf090b83fce12e1ccc704e95f366da743c18e964d9d7e9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 10 00:23:18.779673 env[1217]: time="2025-07-10T00:23:18.779635246Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.32.6\" returns image reference \"sha256:e29293ef7b817bb7b03ce7484edafe6ca0a7087e54074e7d7dcd3bd3c762eee9\"" Jul 10 00:23:18.781327 env[1217]: time="2025-07-10T00:23:18.781279766Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.30.2\"" Jul 10 00:23:18.782030 env[1217]: time="2025-07-10T00:23:18.781993766Z" level=info msg="CreateContainer within sandbox \"2c9892c511ab53dc7c1c7af249db69a287ef72c7b49eebf8a847e08f01f2b561\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Jul 10 00:23:18.791236 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2337147840.mount: Deactivated successfully. Jul 10 00:23:18.796317 env[1217]: time="2025-07-10T00:23:18.796264526Z" level=info msg="CreateContainer within sandbox \"2c9892c511ab53dc7c1c7af249db69a287ef72c7b49eebf8a847e08f01f2b561\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"24a3b349e1630d06278ebee1efd4ec26c38f9b9eed99c9aab43870da51c51a36\"" Jul 10 00:23:18.796930 env[1217]: time="2025-07-10T00:23:18.796895286Z" level=info msg="StartContainer for \"24a3b349e1630d06278ebee1efd4ec26c38f9b9eed99c9aab43870da51c51a36\"" Jul 10 00:23:18.811787 systemd[1]: Started cri-containerd-24a3b349e1630d06278ebee1efd4ec26c38f9b9eed99c9aab43870da51c51a36.scope. Jul 10 00:23:18.838000 audit[1716]: AVC avc: denied { perfmon } for pid=1716 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:18.838000 audit[1716]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001475a0 a2=3c a3=0 items=0 ppid=1578 pid=1716 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:23:18.838000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3234613362333439653136333064303632373865626565316566643465 Jul 10 00:23:18.838000 audit[1716]: AVC avc: denied { bpf } for pid=1716 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:18.838000 audit[1716]: AVC avc: denied { bpf } for pid=1716 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:18.838000 audit[1716]: AVC avc: denied { bpf } for pid=1716 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:18.838000 audit[1716]: AVC avc: denied { perfmon } for pid=1716 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:18.838000 audit[1716]: AVC avc: denied { perfmon } for pid=1716 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:18.838000 audit[1716]: AVC avc: denied { perfmon } for pid=1716 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:18.838000 audit[1716]: AVC avc: denied { perfmon } for pid=1716 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:18.838000 audit[1716]: AVC avc: denied { perfmon } for pid=1716 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:18.838000 audit[1716]: AVC avc: denied { bpf } for pid=1716 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:18.838000 audit[1716]: AVC avc: denied { bpf } for pid=1716 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:18.838000 audit: BPF prog-id=66 op=LOAD Jul 10 00:23:18.838000 audit[1716]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001478e0 a2=78 a3=0 items=0 ppid=1578 pid=1716 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:23:18.838000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3234613362333439653136333064303632373865626565316566643465 Jul 10 00:23:18.838000 audit[1716]: AVC avc: denied { bpf } for pid=1716 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:18.838000 audit[1716]: AVC avc: denied { bpf } for pid=1716 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:18.838000 audit[1716]: AVC avc: denied { perfmon } for pid=1716 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:18.838000 audit[1716]: AVC avc: denied { perfmon } for pid=1716 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:18.838000 audit[1716]: AVC avc: denied { perfmon } for pid=1716 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:18.838000 audit[1716]: AVC avc: denied { perfmon } for pid=1716 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:18.838000 audit[1716]: AVC avc: denied { perfmon } for pid=1716 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:18.838000 audit[1716]: AVC avc: denied { bpf } for pid=1716 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:18.838000 audit[1716]: AVC avc: denied { bpf } for pid=1716 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:18.838000 audit: BPF prog-id=67 op=LOAD Jul 10 00:23:18.838000 audit[1716]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000147670 a2=78 a3=0 items=0 ppid=1578 pid=1716 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:23:18.838000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3234613362333439653136333064303632373865626565316566643465 Jul 10 00:23:18.838000 audit: BPF prog-id=67 op=UNLOAD Jul 10 00:23:18.838000 audit: BPF prog-id=66 op=UNLOAD Jul 10 00:23:18.838000 audit[1716]: AVC avc: denied { bpf } for pid=1716 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:18.838000 audit[1716]: AVC avc: denied { bpf } for pid=1716 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:18.838000 audit[1716]: AVC avc: denied { bpf } for pid=1716 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:18.838000 audit[1716]: AVC avc: denied { perfmon } for pid=1716 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:18.838000 audit[1716]: AVC avc: denied { perfmon } for pid=1716 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:18.838000 audit[1716]: AVC avc: denied { perfmon } for pid=1716 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:18.838000 audit[1716]: AVC avc: denied { perfmon } for pid=1716 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:18.838000 audit[1716]: AVC avc: denied { perfmon } for pid=1716 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:18.838000 audit[1716]: AVC avc: denied { bpf } for pid=1716 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:18.838000 audit[1716]: AVC avc: denied { bpf } for pid=1716 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:18.838000 audit: BPF prog-id=68 op=LOAD Jul 10 00:23:18.838000 audit[1716]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000147b40 a2=78 a3=0 items=0 ppid=1578 pid=1716 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:23:18.838000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3234613362333439653136333064303632373865626565316566643465 Jul 10 00:23:18.851195 env[1217]: time="2025-07-10T00:23:18.851148486Z" level=info msg="StartContainer for \"24a3b349e1630d06278ebee1efd4ec26c38f9b9eed99c9aab43870da51c51a36\" returns successfully" Jul 10 00:23:18.933025 kubelet[1455]: E0710 00:23:18.932968 1455 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-bb72p" podUID="ac010dd4-3be4-467e-b5c3-63ff2bfb42e5" Jul 10 00:23:18.945495 kubelet[1455]: E0710 00:23:18.945272 1455 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Jul 10 00:23:18.967086 kubelet[1455]: I0710 00:23:18.966914 1455 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-proxy-pnzwq" podStartSLOduration=2.041953086 podStartE2EDuration="4.966895526s" podCreationTimestamp="2025-07-10 00:23:14 +0000 UTC" firstStartedPulling="2025-07-10 00:23:15.855479166 +0000 UTC m=+2.648474641" lastFinishedPulling="2025-07-10 00:23:18.780421606 +0000 UTC m=+5.573417081" observedRunningTime="2025-07-10 00:23:18.966468646 +0000 UTC m=+5.759464161" watchObservedRunningTime="2025-07-10 00:23:18.966895526 +0000 UTC m=+5.759891001" Jul 10 00:23:19.054000 audit[1776]: NETFILTER_CFG table=mangle:14 family=2 entries=1 op=nft_register_chain pid=1776 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 10 00:23:19.054000 audit[1776]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffc777d910 a2=0 a3=1 items=0 ppid=1727 pid=1776 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:23:19.054000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Jul 10 00:23:19.054000 audit[1777]: NETFILTER_CFG table=mangle:15 family=10 entries=1 op=nft_register_chain pid=1777 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 10 00:23:19.054000 audit[1777]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=fffff48d53a0 a2=0 a3=1 items=0 ppid=1727 pid=1777 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:23:19.054000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Jul 10 00:23:19.056000 audit[1779]: NETFILTER_CFG table=nat:16 family=10 entries=1 op=nft_register_chain pid=1779 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 10 00:23:19.056000 audit[1779]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffc4dc7f20 a2=0 a3=1 items=0 ppid=1727 pid=1779 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:23:19.056000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Jul 10 00:23:19.056000 audit[1780]: NETFILTER_CFG table=nat:17 family=2 entries=1 op=nft_register_chain pid=1780 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 10 00:23:19.056000 audit[1780]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffeb8aab60 a2=0 a3=1 items=0 ppid=1727 pid=1780 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:23:19.056000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Jul 10 00:23:19.057000 audit[1781]: NETFILTER_CFG table=filter:18 family=10 entries=1 op=nft_register_chain pid=1781 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 10 00:23:19.057000 audit[1781]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffdf984920 a2=0 a3=1 items=0 ppid=1727 pid=1781 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:23:19.057000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Jul 10 00:23:19.057000 audit[1782]: NETFILTER_CFG table=filter:19 family=2 entries=1 op=nft_register_chain pid=1782 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 10 00:23:19.057000 audit[1782]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=fffff9a17f10 a2=0 a3=1 items=0 ppid=1727 pid=1782 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:23:19.057000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Jul 10 00:23:19.156000 audit[1783]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_chain pid=1783 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 10 00:23:19.156000 audit[1783]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=108 a0=3 a1=ffffe648e8b0 a2=0 a3=1 items=0 ppid=1727 pid=1783 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:23:19.156000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Jul 10 00:23:19.161000 audit[1785]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=1785 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 10 00:23:19.161000 audit[1785]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=752 a0=3 a1=ffffd1c866a0 a2=0 a3=1 items=0 ppid=1727 pid=1785 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:23:19.161000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Jul 10 00:23:19.164000 audit[1788]: NETFILTER_CFG table=filter:22 family=2 entries=2 op=nft_register_chain pid=1788 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 10 00:23:19.164000 audit[1788]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=836 a0=3 a1=ffffffc46d30 a2=0 a3=1 items=0 ppid=1727 pid=1788 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:23:19.164000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Jul 10 00:23:19.165000 audit[1789]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_chain pid=1789 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 10 00:23:19.165000 audit[1789]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffd301b880 a2=0 a3=1 items=0 ppid=1727 pid=1789 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:23:19.165000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Jul 10 00:23:19.167000 audit[1791]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_register_rule pid=1791 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 10 00:23:19.167000 audit[1791]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffdd8d27a0 a2=0 a3=1 items=0 ppid=1727 pid=1791 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:23:19.167000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Jul 10 00:23:19.168000 audit[1792]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_chain pid=1792 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 10 00:23:19.168000 audit[1792]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffff7974980 a2=0 a3=1 items=0 ppid=1727 pid=1792 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:23:19.168000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Jul 10 00:23:19.170000 audit[1794]: NETFILTER_CFG table=filter:26 family=2 entries=1 op=nft_register_rule pid=1794 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 10 00:23:19.170000 audit[1794]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=ffffff7d7a20 a2=0 a3=1 items=0 ppid=1727 pid=1794 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:23:19.170000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Jul 10 00:23:19.173000 audit[1797]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_rule pid=1797 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 10 00:23:19.173000 audit[1797]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=ffffdcc2e510 a2=0 a3=1 items=0 ppid=1727 pid=1797 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:23:19.173000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 Jul 10 00:23:19.174000 audit[1798]: NETFILTER_CFG table=filter:28 family=2 entries=1 op=nft_register_chain pid=1798 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 10 00:23:19.174000 audit[1798]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffd13e3140 a2=0 a3=1 items=0 ppid=1727 pid=1798 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:23:19.174000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Jul 10 00:23:19.178000 audit[1800]: NETFILTER_CFG table=filter:29 family=2 entries=1 op=nft_register_rule pid=1800 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 10 00:23:19.178000 audit[1800]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffd98a6710 a2=0 a3=1 items=0 ppid=1727 pid=1800 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:23:19.178000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Jul 10 00:23:19.179000 audit[1801]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_chain pid=1801 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 10 00:23:19.179000 audit[1801]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffef24aca0 a2=0 a3=1 items=0 ppid=1727 pid=1801 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:23:19.179000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Jul 10 00:23:19.181000 audit[1803]: NETFILTER_CFG table=filter:31 family=2 entries=1 op=nft_register_rule pid=1803 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 10 00:23:19.181000 audit[1803]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffe98f7d40 a2=0 a3=1 items=0 ppid=1727 pid=1803 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:23:19.181000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Jul 10 00:23:19.184000 audit[1806]: NETFILTER_CFG table=filter:32 family=2 entries=1 op=nft_register_rule pid=1806 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 10 00:23:19.184000 audit[1806]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffce3bae90 a2=0 a3=1 items=0 ppid=1727 pid=1806 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:23:19.184000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Jul 10 00:23:19.187000 audit[1809]: NETFILTER_CFG table=filter:33 family=2 entries=1 op=nft_register_rule pid=1809 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 10 00:23:19.187000 audit[1809]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffd25ec560 a2=0 a3=1 items=0 ppid=1727 pid=1809 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:23:19.187000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Jul 10 00:23:19.188000 audit[1810]: NETFILTER_CFG table=nat:34 family=2 entries=1 op=nft_register_chain pid=1810 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 10 00:23:19.188000 audit[1810]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=ffffc4ecd740 a2=0 a3=1 items=0 ppid=1727 pid=1810 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:23:19.188000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Jul 10 00:23:19.190000 audit[1812]: NETFILTER_CFG table=nat:35 family=2 entries=2 op=nft_register_chain pid=1812 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 10 00:23:19.190000 audit[1812]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=600 a0=3 a1=ffffdb596580 a2=0 a3=1 items=0 ppid=1727 pid=1812 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:23:19.190000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Jul 10 00:23:19.218000 audit[1816]: NETFILTER_CFG table=nat:36 family=2 entries=2 op=nft_register_chain pid=1816 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 10 00:23:19.218000 audit[1816]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=608 a0=3 a1=ffffd0667670 a2=0 a3=1 items=0 ppid=1727 pid=1816 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:23:19.218000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Jul 10 00:23:19.219000 audit[1817]: NETFILTER_CFG table=nat:37 family=2 entries=1 op=nft_register_chain pid=1817 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 10 00:23:19.219000 audit[1817]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffeef56110 a2=0 a3=1 items=0 ppid=1727 pid=1817 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:23:19.219000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Jul 10 00:23:19.221000 audit[1819]: NETFILTER_CFG table=nat:38 family=2 entries=2 op=nft_register_chain pid=1819 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 10 00:23:19.221000 audit[1819]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=612 a0=3 a1=fffff38f8c00 a2=0 a3=1 items=0 ppid=1727 pid=1819 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:23:19.221000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Jul 10 00:23:19.246000 audit[1825]: NETFILTER_CFG table=filter:39 family=2 entries=10 op=nft_register_rule pid=1825 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 10 00:23:19.246000 audit[1825]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6736 a0=3 a1=ffffe69300a0 a2=0 a3=1 items=0 ppid=1727 pid=1825 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:23:19.246000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 10 00:23:19.267000 audit[1825]: NETFILTER_CFG table=nat:40 family=2 entries=28 op=nft_register_chain pid=1825 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 10 00:23:19.267000 audit[1825]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=12660 a0=3 a1=ffffe69300a0 a2=0 a3=1 items=0 ppid=1727 pid=1825 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:23:19.267000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 10 00:23:19.268000 audit[1832]: NETFILTER_CFG table=filter:41 family=10 entries=1 op=nft_register_chain pid=1832 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 10 00:23:19.268000 audit[1832]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=108 a0=3 a1=fffff57a4280 a2=0 a3=1 items=0 ppid=1727 pid=1832 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:23:19.268000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Jul 10 00:23:19.271000 audit[1834]: NETFILTER_CFG table=filter:42 family=10 entries=2 op=nft_register_chain pid=1834 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 10 00:23:19.271000 audit[1834]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=836 a0=3 a1=ffffe9bf0360 a2=0 a3=1 items=0 ppid=1727 pid=1834 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:23:19.271000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 Jul 10 00:23:19.273000 audit[1837]: NETFILTER_CFG table=filter:43 family=10 entries=2 op=nft_register_chain pid=1837 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 10 00:23:19.273000 audit[1837]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=836 a0=3 a1=fffff8c91dc0 a2=0 a3=1 items=0 ppid=1727 pid=1837 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:23:19.273000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 Jul 10 00:23:19.275000 audit[1838]: NETFILTER_CFG table=filter:44 family=10 entries=1 op=nft_register_chain pid=1838 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 10 00:23:19.275000 audit[1838]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffecb9ff50 a2=0 a3=1 items=0 ppid=1727 pid=1838 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:23:19.275000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Jul 10 00:23:19.277000 audit[1840]: NETFILTER_CFG table=filter:45 family=10 entries=1 op=nft_register_rule pid=1840 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 10 00:23:19.277000 audit[1840]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffe1b317c0 a2=0 a3=1 items=0 ppid=1727 pid=1840 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:23:19.277000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Jul 10 00:23:19.278000 audit[1841]: NETFILTER_CFG table=filter:46 family=10 entries=1 op=nft_register_chain pid=1841 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 10 00:23:19.278000 audit[1841]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffd23828e0 a2=0 a3=1 items=0 ppid=1727 pid=1841 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:23:19.278000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Jul 10 00:23:19.280000 audit[1843]: NETFILTER_CFG table=filter:47 family=10 entries=1 op=nft_register_rule pid=1843 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 10 00:23:19.280000 audit[1843]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=ffffe5ef0a80 a2=0 a3=1 items=0 ppid=1727 pid=1843 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:23:19.280000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 Jul 10 00:23:19.283000 audit[1846]: NETFILTER_CFG table=filter:48 family=10 entries=2 op=nft_register_chain pid=1846 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 10 00:23:19.283000 audit[1846]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=828 a0=3 a1=ffffcbe9c3a0 a2=0 a3=1 items=0 ppid=1727 pid=1846 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:23:19.283000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Jul 10 00:23:19.284000 audit[1847]: NETFILTER_CFG table=filter:49 family=10 entries=1 op=nft_register_chain pid=1847 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 10 00:23:19.284000 audit[1847]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffeea74110 a2=0 a3=1 items=0 ppid=1727 pid=1847 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:23:19.284000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Jul 10 00:23:19.286000 audit[1849]: NETFILTER_CFG table=filter:50 family=10 entries=1 op=nft_register_rule pid=1849 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 10 00:23:19.286000 audit[1849]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffdf84c920 a2=0 a3=1 items=0 ppid=1727 pid=1849 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:23:19.286000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Jul 10 00:23:19.287000 audit[1850]: NETFILTER_CFG table=filter:51 family=10 entries=1 op=nft_register_chain pid=1850 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 10 00:23:19.287000 audit[1850]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=fffff6e74010 a2=0 a3=1 items=0 ppid=1727 pid=1850 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:23:19.287000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Jul 10 00:23:19.289000 audit[1852]: NETFILTER_CFG table=filter:52 family=10 entries=1 op=nft_register_rule pid=1852 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 10 00:23:19.289000 audit[1852]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffd4e6a660 a2=0 a3=1 items=0 ppid=1727 pid=1852 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:23:19.289000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Jul 10 00:23:19.292000 audit[1855]: NETFILTER_CFG table=filter:53 family=10 entries=1 op=nft_register_rule pid=1855 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 10 00:23:19.292000 audit[1855]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffc7cc2cd0 a2=0 a3=1 items=0 ppid=1727 pid=1855 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:23:19.292000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Jul 10 00:23:19.295000 audit[1858]: NETFILTER_CFG table=filter:54 family=10 entries=1 op=nft_register_rule pid=1858 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 10 00:23:19.295000 audit[1858]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffd57c9b30 a2=0 a3=1 items=0 ppid=1727 pid=1858 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:23:19.295000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C Jul 10 00:23:19.296000 audit[1859]: NETFILTER_CFG table=nat:55 family=10 entries=1 op=nft_register_chain pid=1859 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 10 00:23:19.296000 audit[1859]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=ffffed850980 a2=0 a3=1 items=0 ppid=1727 pid=1859 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:23:19.296000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Jul 10 00:23:19.298000 audit[1861]: NETFILTER_CFG table=nat:56 family=10 entries=2 op=nft_register_chain pid=1861 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 10 00:23:19.298000 audit[1861]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=600 a0=3 a1=ffffd1962060 a2=0 a3=1 items=0 ppid=1727 pid=1861 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:23:19.298000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Jul 10 00:23:19.301000 audit[1864]: NETFILTER_CFG table=nat:57 family=10 entries=2 op=nft_register_chain pid=1864 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 10 00:23:19.301000 audit[1864]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=608 a0=3 a1=ffffd9696890 a2=0 a3=1 items=0 ppid=1727 pid=1864 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:23:19.301000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Jul 10 00:23:19.302000 audit[1865]: NETFILTER_CFG table=nat:58 family=10 entries=1 op=nft_register_chain pid=1865 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 10 00:23:19.302000 audit[1865]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffd6d59f30 a2=0 a3=1 items=0 ppid=1727 pid=1865 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:23:19.302000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Jul 10 00:23:19.304000 audit[1867]: NETFILTER_CFG table=nat:59 family=10 entries=2 op=nft_register_chain pid=1867 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 10 00:23:19.304000 audit[1867]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=612 a0=3 a1=ffffc2a66de0 a2=0 a3=1 items=0 ppid=1727 pid=1867 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:23:19.304000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Jul 10 00:23:19.304000 audit[1868]: NETFILTER_CFG table=filter:60 family=10 entries=1 op=nft_register_chain pid=1868 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 10 00:23:19.304000 audit[1868]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffe0daafe0 a2=0 a3=1 items=0 ppid=1727 pid=1868 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:23:19.304000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Jul 10 00:23:19.306000 audit[1870]: NETFILTER_CFG table=filter:61 family=10 entries=1 op=nft_register_rule pid=1870 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 10 00:23:19.306000 audit[1870]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=ffffda223600 a2=0 a3=1 items=0 ppid=1727 pid=1870 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:23:19.306000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Jul 10 00:23:19.309000 audit[1873]: NETFILTER_CFG table=filter:62 family=10 entries=1 op=nft_register_rule pid=1873 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 10 00:23:19.309000 audit[1873]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=fffffe5161e0 a2=0 a3=1 items=0 ppid=1727 pid=1873 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:23:19.309000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Jul 10 00:23:19.312000 audit[1875]: NETFILTER_CFG table=filter:63 family=10 entries=3 op=nft_register_rule pid=1875 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Jul 10 00:23:19.312000 audit[1875]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2088 a0=3 a1=ffffca7a0480 a2=0 a3=1 items=0 ppid=1727 pid=1875 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:23:19.312000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 10 00:23:19.312000 audit[1875]: NETFILTER_CFG table=nat:64 family=10 entries=7 op=nft_register_chain pid=1875 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Jul 10 00:23:19.312000 audit[1875]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2056 a0=3 a1=ffffca7a0480 a2=0 a3=1 items=0 ppid=1727 pid=1875 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:23:19.312000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 10 00:23:19.773500 kubelet[1455]: E0710 00:23:19.773382 1455 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 00:23:19.947125 kubelet[1455]: E0710 00:23:19.947075 1455 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Jul 10 00:23:20.590000 audit[1877]: NETFILTER_CFG table=filter:65 family=2 entries=18 op=nft_register_rule pid=1877 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 10 00:23:20.590000 audit[1877]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6736 a0=3 a1=ffffdbd64860 a2=0 a3=1 items=0 ppid=1727 pid=1877 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:23:20.590000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 10 00:23:20.598000 audit[1877]: NETFILTER_CFG table=nat:66 family=2 entries=16 op=nft_register_rule pid=1877 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 10 00:23:20.598000 audit[1877]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=4236 a0=3 a1=ffffdbd64860 a2=0 a3=1 items=0 ppid=1727 pid=1877 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:23:20.598000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 10 00:23:20.611000 audit[1879]: NETFILTER_CFG table=filter:67 family=2 entries=18 op=nft_register_rule pid=1879 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 10 00:23:20.611000 audit[1879]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6736 a0=3 a1=ffffc1f95050 a2=0 a3=1 items=0 ppid=1727 pid=1879 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:23:20.611000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 10 00:23:20.617000 audit[1879]: NETFILTER_CFG table=nat:68 family=2 entries=16 op=nft_register_rule pid=1879 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 10 00:23:20.617000 audit[1879]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=4236 a0=3 a1=ffffc1f95050 a2=0 a3=1 items=0 ppid=1727 pid=1879 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:23:20.617000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 10 00:23:20.773710 kubelet[1455]: E0710 00:23:20.773658 1455 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 00:23:20.932956 kubelet[1455]: E0710 00:23:20.932842 1455 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-bb72p" podUID="ac010dd4-3be4-467e-b5c3-63ff2bfb42e5" Jul 10 00:23:21.166285 env[1217]: time="2025-07-10T00:23:21.166236606Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.30.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 10 00:23:21.167536 env[1217]: time="2025-07-10T00:23:21.167506406Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:f6e344d58b3c5524e767c7d1dd4cb29c85ce820b0f3005a603532b6a22db5588,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 10 00:23:21.169453 env[1217]: time="2025-07-10T00:23:21.169406926Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.30.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 10 00:23:21.170962 env[1217]: time="2025-07-10T00:23:21.170932686Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:50686775cc60acb78bd92a66fa2d84e1700b2d8e43a718fbadbf35e59baefb4d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 10 00:23:21.171521 env[1217]: time="2025-07-10T00:23:21.171488246Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.30.2\" returns image reference \"sha256:f6e344d58b3c5524e767c7d1dd4cb29c85ce820b0f3005a603532b6a22db5588\"" Jul 10 00:23:21.174067 env[1217]: time="2025-07-10T00:23:21.174027846Z" level=info msg="CreateContainer within sandbox \"67bc978a79fabf84d0af4da93473008d57a1ee9bf4c79c1ac3d7a807b6165740\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Jul 10 00:23:21.187213 env[1217]: time="2025-07-10T00:23:21.187086166Z" level=info msg="CreateContainer within sandbox \"67bc978a79fabf84d0af4da93473008d57a1ee9bf4c79c1ac3d7a807b6165740\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"be6de15a0417e56a20d08b7bcb478bdf868fd1561da024393cf3a36b452160d2\"" Jul 10 00:23:21.187750 env[1217]: time="2025-07-10T00:23:21.187713286Z" level=info msg="StartContainer for \"be6de15a0417e56a20d08b7bcb478bdf868fd1561da024393cf3a36b452160d2\"" Jul 10 00:23:21.208026 systemd[1]: run-containerd-runc-k8s.io-be6de15a0417e56a20d08b7bcb478bdf868fd1561da024393cf3a36b452160d2-runc.sKh8mN.mount: Deactivated successfully. Jul 10 00:23:21.209634 systemd[1]: Started cri-containerd-be6de15a0417e56a20d08b7bcb478bdf868fd1561da024393cf3a36b452160d2.scope. Jul 10 00:23:21.234000 audit[1889]: AVC avc: denied { perfmon } for pid=1889 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:21.234000 audit[1889]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001475a0 a2=3c a3=0 items=0 ppid=1577 pid=1889 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:23:21.234000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6265366465313561303431376535366132306430386237626362343738 Jul 10 00:23:21.235000 audit[1889]: AVC avc: denied { bpf } for pid=1889 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:21.235000 audit[1889]: AVC avc: denied { bpf } for pid=1889 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:21.235000 audit[1889]: AVC avc: denied { bpf } for pid=1889 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:21.235000 audit[1889]: AVC avc: denied { perfmon } for pid=1889 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:21.235000 audit[1889]: AVC avc: denied { perfmon } for pid=1889 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:21.235000 audit[1889]: AVC avc: denied { perfmon } for pid=1889 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:21.235000 audit[1889]: AVC avc: denied { perfmon } for pid=1889 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:21.235000 audit[1889]: AVC avc: denied { perfmon } for pid=1889 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:21.235000 audit[1889]: AVC avc: denied { bpf } for pid=1889 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:21.235000 audit[1889]: AVC avc: denied { bpf } for pid=1889 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:21.235000 audit: BPF prog-id=69 op=LOAD Jul 10 00:23:21.235000 audit[1889]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001478e0 a2=78 a3=0 items=0 ppid=1577 pid=1889 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:23:21.235000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6265366465313561303431376535366132306430386237626362343738 Jul 10 00:23:21.235000 audit[1889]: AVC avc: denied { bpf } for pid=1889 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:21.235000 audit[1889]: AVC avc: denied { bpf } for pid=1889 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:21.235000 audit[1889]: AVC avc: denied { perfmon } for pid=1889 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:21.235000 audit[1889]: AVC avc: denied { perfmon } for pid=1889 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:21.235000 audit[1889]: AVC avc: denied { perfmon } for pid=1889 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:21.235000 audit[1889]: AVC avc: denied { perfmon } for pid=1889 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:21.235000 audit[1889]: AVC avc: denied { perfmon } for pid=1889 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:21.235000 audit[1889]: AVC avc: denied { bpf } for pid=1889 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:21.235000 audit[1889]: AVC avc: denied { bpf } for pid=1889 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:21.235000 audit: BPF prog-id=70 op=LOAD Jul 10 00:23:21.235000 audit[1889]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000147670 a2=78 a3=0 items=0 ppid=1577 pid=1889 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:23:21.235000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6265366465313561303431376535366132306430386237626362343738 Jul 10 00:23:21.236000 audit: BPF prog-id=70 op=UNLOAD Jul 10 00:23:21.236000 audit: BPF prog-id=69 op=UNLOAD Jul 10 00:23:21.236000 audit[1889]: AVC avc: denied { bpf } for pid=1889 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:21.236000 audit[1889]: AVC avc: denied { bpf } for pid=1889 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:21.236000 audit[1889]: AVC avc: denied { bpf } for pid=1889 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:21.236000 audit[1889]: AVC avc: denied { perfmon } for pid=1889 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:21.236000 audit[1889]: AVC avc: denied { perfmon } for pid=1889 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:21.236000 audit[1889]: AVC avc: denied { perfmon } for pid=1889 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:21.236000 audit[1889]: AVC avc: denied { perfmon } for pid=1889 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:21.236000 audit[1889]: AVC avc: denied { perfmon } for pid=1889 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:21.236000 audit[1889]: AVC avc: denied { bpf } for pid=1889 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:21.236000 audit[1889]: AVC avc: denied { bpf } for pid=1889 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:21.236000 audit: BPF prog-id=71 op=LOAD Jul 10 00:23:21.236000 audit[1889]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000147b40 a2=78 a3=0 items=0 ppid=1577 pid=1889 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:23:21.236000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6265366465313561303431376535366132306430386237626362343738 Jul 10 00:23:21.249807 env[1217]: time="2025-07-10T00:23:21.249755566Z" level=info msg="StartContainer for \"be6de15a0417e56a20d08b7bcb478bdf868fd1561da024393cf3a36b452160d2\" returns successfully" Jul 10 00:23:21.630000 audit[1917]: NETFILTER_CFG table=filter:69 family=2 entries=15 op=nft_register_rule pid=1917 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 10 00:23:21.630000 audit[1917]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=4504 a0=3 a1=ffffda342e70 a2=0 a3=1 items=0 ppid=1727 pid=1917 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:23:21.630000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 10 00:23:21.642000 audit[1917]: NETFILTER_CFG table=nat:70 family=2 entries=37 op=nft_register_chain pid=1917 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 10 00:23:21.642000 audit[1917]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=14964 a0=3 a1=ffffda342e70 a2=0 a3=1 items=0 ppid=1727 pid=1917 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:23:21.642000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 10 00:23:21.774374 kubelet[1455]: E0710 00:23:21.774323 1455 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 00:23:21.821748 env[1217]: time="2025-07-10T00:23:21.821694886Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Jul 10 00:23:21.823764 systemd[1]: cri-containerd-be6de15a0417e56a20d08b7bcb478bdf868fd1561da024393cf3a36b452160d2.scope: Deactivated successfully. Jul 10 00:23:21.827000 audit: BPF prog-id=71 op=UNLOAD Jul 10 00:23:21.856979 kubelet[1455]: I0710 00:23:21.856090 1455 kubelet_node_status.go:501] "Fast updating node status as it just became ready" Jul 10 00:23:22.006165 env[1217]: time="2025-07-10T00:23:22.006058046Z" level=info msg="shim disconnected" id=be6de15a0417e56a20d08b7bcb478bdf868fd1561da024393cf3a36b452160d2 Jul 10 00:23:22.006165 env[1217]: time="2025-07-10T00:23:22.006106366Z" level=warning msg="cleaning up after shim disconnected" id=be6de15a0417e56a20d08b7bcb478bdf868fd1561da024393cf3a36b452160d2 namespace=k8s.io Jul 10 00:23:22.006165 env[1217]: time="2025-07-10T00:23:22.006118326Z" level=info msg="cleaning up dead shim" Jul 10 00:23:22.013680 env[1217]: time="2025-07-10T00:23:22.013620526Z" level=warning msg="cleanup warnings time=\"2025-07-10T00:23:22Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=1932 runtime=io.containerd.runc.v2\n" Jul 10 00:23:22.182601 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-be6de15a0417e56a20d08b7bcb478bdf868fd1561da024393cf3a36b452160d2-rootfs.mount: Deactivated successfully. Jul 10 00:23:22.609000 audit[1947]: NETFILTER_CFG table=filter:71 family=2 entries=12 op=nft_register_rule pid=1947 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 10 00:23:22.611611 kernel: kauditd_printk_skb: 292 callbacks suppressed Jul 10 00:23:22.611673 kernel: audit: type=1325 audit(1752107002.609:533): table=filter:71 family=2 entries=12 op=nft_register_rule pid=1947 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 10 00:23:22.611702 kernel: audit: type=1300 audit(1752107002.609:533): arch=c00000b7 syscall=211 success=yes exit=4504 a0=3 a1=ffffd7a014e0 a2=0 a3=1 items=0 ppid=1727 pid=1947 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:23:22.609000 audit[1947]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=4504 a0=3 a1=ffffd7a014e0 a2=0 a3=1 items=0 ppid=1727 pid=1947 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:23:22.614390 kernel: audit: type=1327 audit(1752107002.609:533): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 10 00:23:22.609000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 10 00:23:22.628000 audit[1947]: NETFILTER_CFG table=nat:72 family=2 entries=58 op=nft_register_chain pid=1947 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 10 00:23:22.628000 audit[1947]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=20628 a0=3 a1=ffffd7a014e0 a2=0 a3=1 items=0 ppid=1727 pid=1947 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:23:22.633256 kernel: audit: type=1325 audit(1752107002.628:534): table=nat:72 family=2 entries=58 op=nft_register_chain pid=1947 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 10 00:23:22.633304 kernel: audit: type=1300 audit(1752107002.628:534): arch=c00000b7 syscall=211 success=yes exit=20628 a0=3 a1=ffffd7a014e0 a2=0 a3=1 items=0 ppid=1727 pid=1947 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:23:22.633327 kernel: audit: type=1327 audit(1752107002.628:534): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 10 00:23:22.628000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 10 00:23:22.775364 kubelet[1455]: E0710 00:23:22.775315 1455 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 00:23:22.937211 systemd[1]: Created slice kubepods-besteffort-podac010dd4_3be4_467e_b5c3_63ff2bfb42e5.slice. Jul 10 00:23:22.939537 env[1217]: time="2025-07-10T00:23:22.939499886Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-bb72p,Uid:ac010dd4-3be4-467e-b5c3-63ff2bfb42e5,Namespace:calico-system,Attempt:0,}" Jul 10 00:23:22.963660 env[1217]: time="2025-07-10T00:23:22.963604606Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.30.2\"" Jul 10 00:23:23.051991 env[1217]: time="2025-07-10T00:23:23.051900286Z" level=error msg="Failed to destroy network for sandbox \"a51783dab29ad920b20e34ef28c0c75aefc64baa7bab9c11fab04269d865df96\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 10 00:23:23.053330 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-a51783dab29ad920b20e34ef28c0c75aefc64baa7bab9c11fab04269d865df96-shm.mount: Deactivated successfully. Jul 10 00:23:23.054295 env[1217]: time="2025-07-10T00:23:23.054249006Z" level=error msg="encountered an error cleaning up failed sandbox \"a51783dab29ad920b20e34ef28c0c75aefc64baa7bab9c11fab04269d865df96\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 10 00:23:23.054376 env[1217]: time="2025-07-10T00:23:23.054316806Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-bb72p,Uid:ac010dd4-3be4-467e-b5c3-63ff2bfb42e5,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"a51783dab29ad920b20e34ef28c0c75aefc64baa7bab9c11fab04269d865df96\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 10 00:23:23.054972 kubelet[1455]: E0710 00:23:23.054569 1455 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"a51783dab29ad920b20e34ef28c0c75aefc64baa7bab9c11fab04269d865df96\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 10 00:23:23.054972 kubelet[1455]: E0710 00:23:23.054658 1455 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"a51783dab29ad920b20e34ef28c0c75aefc64baa7bab9c11fab04269d865df96\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-bb72p" Jul 10 00:23:23.054972 kubelet[1455]: E0710 00:23:23.054693 1455 kuberuntime_manager.go:1237] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"a51783dab29ad920b20e34ef28c0c75aefc64baa7bab9c11fab04269d865df96\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-bb72p" Jul 10 00:23:23.055133 kubelet[1455]: E0710 00:23:23.054734 1455 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-bb72p_calico-system(ac010dd4-3be4-467e-b5c3-63ff2bfb42e5)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-bb72p_calico-system(ac010dd4-3be4-467e-b5c3-63ff2bfb42e5)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"a51783dab29ad920b20e34ef28c0c75aefc64baa7bab9c11fab04269d865df96\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-bb72p" podUID="ac010dd4-3be4-467e-b5c3-63ff2bfb42e5" Jul 10 00:23:23.610000 audit[1984]: NETFILTER_CFG table=filter:73 family=2 entries=12 op=nft_register_rule pid=1984 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 10 00:23:23.610000 audit[1984]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=4504 a0=3 a1=ffffe3cd8a50 a2=0 a3=1 items=0 ppid=1727 pid=1984 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:23:23.615276 kernel: audit: type=1325 audit(1752107003.610:535): table=filter:73 family=2 entries=12 op=nft_register_rule pid=1984 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 10 00:23:23.615325 kernel: audit: type=1300 audit(1752107003.610:535): arch=c00000b7 syscall=211 success=yes exit=4504 a0=3 a1=ffffe3cd8a50 a2=0 a3=1 items=0 ppid=1727 pid=1984 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:23:23.615356 kernel: audit: type=1327 audit(1752107003.610:535): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 10 00:23:23.610000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 10 00:23:23.626000 audit[1984]: NETFILTER_CFG table=nat:74 family=2 entries=22 op=nft_register_rule pid=1984 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 10 00:23:23.626000 audit[1984]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6540 a0=3 a1=ffffe3cd8a50 a2=0 a3=1 items=0 ppid=1727 pid=1984 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:23:23.626000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 10 00:23:23.629468 kernel: audit: type=1325 audit(1752107003.626:536): table=nat:74 family=2 entries=22 op=nft_register_rule pid=1984 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 10 00:23:23.775811 kubelet[1455]: E0710 00:23:23.775761 1455 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 00:23:23.967257 kubelet[1455]: I0710 00:23:23.967158 1455 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="a51783dab29ad920b20e34ef28c0c75aefc64baa7bab9c11fab04269d865df96" Jul 10 00:23:23.967901 env[1217]: time="2025-07-10T00:23:23.967849846Z" level=info msg="StopPodSandbox for \"a51783dab29ad920b20e34ef28c0c75aefc64baa7bab9c11fab04269d865df96\"" Jul 10 00:23:24.032356 env[1217]: time="2025-07-10T00:23:24.032284726Z" level=error msg="StopPodSandbox for \"a51783dab29ad920b20e34ef28c0c75aefc64baa7bab9c11fab04269d865df96\" failed" error="failed to destroy network for sandbox \"a51783dab29ad920b20e34ef28c0c75aefc64baa7bab9c11fab04269d865df96\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 10 00:23:24.032706 kubelet[1455]: E0710 00:23:24.032658 1455 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"a51783dab29ad920b20e34ef28c0c75aefc64baa7bab9c11fab04269d865df96\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="a51783dab29ad920b20e34ef28c0c75aefc64baa7bab9c11fab04269d865df96" Jul 10 00:23:24.032780 kubelet[1455]: E0710 00:23:24.032735 1455 kuberuntime_manager.go:1546] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"a51783dab29ad920b20e34ef28c0c75aefc64baa7bab9c11fab04269d865df96"} Jul 10 00:23:24.032821 kubelet[1455]: E0710 00:23:24.032802 1455 kuberuntime_manager.go:1146] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"ac010dd4-3be4-467e-b5c3-63ff2bfb42e5\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"a51783dab29ad920b20e34ef28c0c75aefc64baa7bab9c11fab04269d865df96\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Jul 10 00:23:24.032879 kubelet[1455]: E0710 00:23:24.032828 1455 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"ac010dd4-3be4-467e-b5c3-63ff2bfb42e5\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"a51783dab29ad920b20e34ef28c0c75aefc64baa7bab9c11fab04269d865df96\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-bb72p" podUID="ac010dd4-3be4-467e-b5c3-63ff2bfb42e5" Jul 10 00:23:24.776099 kubelet[1455]: E0710 00:23:24.776058 1455 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 00:23:25.500850 kubelet[1455]: W0710 00:23:25.500720 1455 reflector.go:569] object-"default"/"kube-root-ca.crt": failed to list *v1.ConfigMap: configmaps "kube-root-ca.crt" is forbidden: User "system:node:10.0.0.22" cannot list resource "configmaps" in API group "" in the namespace "default": no relationship found between node '10.0.0.22' and this object Jul 10 00:23:25.500850 kubelet[1455]: E0710 00:23:25.500776 1455 reflector.go:166] "Unhandled Error" err="object-\"default\"/\"kube-root-ca.crt\": Failed to watch *v1.ConfigMap: failed to list *v1.ConfigMap: configmaps \"kube-root-ca.crt\" is forbidden: User \"system:node:10.0.0.22\" cannot list resource \"configmaps\" in API group \"\" in the namespace \"default\": no relationship found between node '10.0.0.22' and this object" logger="UnhandledError" Jul 10 00:23:25.500850 kubelet[1455]: I0710 00:23:25.500818 1455 status_manager.go:890] "Failed to get status for pod" podUID="42e01b8f-2f0e-4715-840b-6f672d61337a" pod="default/nginx-deployment-7fcdb87857-mwnr8" err="pods \"nginx-deployment-7fcdb87857-mwnr8\" is forbidden: User \"system:node:10.0.0.22\" cannot get resource \"pods\" in API group \"\" in the namespace \"default\": no relationship found between node '10.0.0.22' and this object" Jul 10 00:23:25.501536 systemd[1]: Created slice kubepods-besteffort-pod42e01b8f_2f0e_4715_840b_6f672d61337a.slice. Jul 10 00:23:25.547886 kubelet[1455]: I0710 00:23:25.547840 1455 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-t5p79\" (UniqueName: \"kubernetes.io/projected/42e01b8f-2f0e-4715-840b-6f672d61337a-kube-api-access-t5p79\") pod \"nginx-deployment-7fcdb87857-mwnr8\" (UID: \"42e01b8f-2f0e-4715-840b-6f672d61337a\") " pod="default/nginx-deployment-7fcdb87857-mwnr8" Jul 10 00:23:25.776678 kubelet[1455]: E0710 00:23:25.776572 1455 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 00:23:26.404694 env[1217]: time="2025-07-10T00:23:26.404636726Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-7fcdb87857-mwnr8,Uid:42e01b8f-2f0e-4715-840b-6f672d61337a,Namespace:default,Attempt:0,}" Jul 10 00:23:26.605430 env[1217]: time="2025-07-10T00:23:26.605317566Z" level=error msg="Failed to destroy network for sandbox \"0cbe2f9f5f2c0b67bcd2e1b08b365ad6cb1003f64d7574dfbbff4edb1560d63b\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 10 00:23:26.605977 env[1217]: time="2025-07-10T00:23:26.605937806Z" level=error msg="encountered an error cleaning up failed sandbox \"0cbe2f9f5f2c0b67bcd2e1b08b365ad6cb1003f64d7574dfbbff4edb1560d63b\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 10 00:23:26.606096 env[1217]: time="2025-07-10T00:23:26.606067806Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-7fcdb87857-mwnr8,Uid:42e01b8f-2f0e-4715-840b-6f672d61337a,Namespace:default,Attempt:0,} failed, error" error="failed to setup network for sandbox \"0cbe2f9f5f2c0b67bcd2e1b08b365ad6cb1003f64d7574dfbbff4edb1560d63b\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 10 00:23:26.606753 kubelet[1455]: E0710 00:23:26.606393 1455 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"0cbe2f9f5f2c0b67bcd2e1b08b365ad6cb1003f64d7574dfbbff4edb1560d63b\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 10 00:23:26.606753 kubelet[1455]: E0710 00:23:26.606463 1455 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"0cbe2f9f5f2c0b67bcd2e1b08b365ad6cb1003f64d7574dfbbff4edb1560d63b\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-7fcdb87857-mwnr8" Jul 10 00:23:26.606753 kubelet[1455]: E0710 00:23:26.606484 1455 kuberuntime_manager.go:1237] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"0cbe2f9f5f2c0b67bcd2e1b08b365ad6cb1003f64d7574dfbbff4edb1560d63b\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-7fcdb87857-mwnr8" Jul 10 00:23:26.606896 kubelet[1455]: E0710 00:23:26.606525 1455 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"nginx-deployment-7fcdb87857-mwnr8_default(42e01b8f-2f0e-4715-840b-6f672d61337a)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"nginx-deployment-7fcdb87857-mwnr8_default(42e01b8f-2f0e-4715-840b-6f672d61337a)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"0cbe2f9f5f2c0b67bcd2e1b08b365ad6cb1003f64d7574dfbbff4edb1560d63b\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-7fcdb87857-mwnr8" podUID="42e01b8f-2f0e-4715-840b-6f672d61337a" Jul 10 00:23:26.608259 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-0cbe2f9f5f2c0b67bcd2e1b08b365ad6cb1003f64d7574dfbbff4edb1560d63b-shm.mount: Deactivated successfully. Jul 10 00:23:26.777257 kubelet[1455]: E0710 00:23:26.777159 1455 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 00:23:26.972222 kubelet[1455]: I0710 00:23:26.972191 1455 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="0cbe2f9f5f2c0b67bcd2e1b08b365ad6cb1003f64d7574dfbbff4edb1560d63b" Jul 10 00:23:26.972711 env[1217]: time="2025-07-10T00:23:26.972676686Z" level=info msg="StopPodSandbox for \"0cbe2f9f5f2c0b67bcd2e1b08b365ad6cb1003f64d7574dfbbff4edb1560d63b\"" Jul 10 00:23:26.994354 env[1217]: time="2025-07-10T00:23:26.994287446Z" level=error msg="StopPodSandbox for \"0cbe2f9f5f2c0b67bcd2e1b08b365ad6cb1003f64d7574dfbbff4edb1560d63b\" failed" error="failed to destroy network for sandbox \"0cbe2f9f5f2c0b67bcd2e1b08b365ad6cb1003f64d7574dfbbff4edb1560d63b\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 10 00:23:26.994913 kubelet[1455]: E0710 00:23:26.994877 1455 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"0cbe2f9f5f2c0b67bcd2e1b08b365ad6cb1003f64d7574dfbbff4edb1560d63b\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="0cbe2f9f5f2c0b67bcd2e1b08b365ad6cb1003f64d7574dfbbff4edb1560d63b" Jul 10 00:23:26.994999 kubelet[1455]: E0710 00:23:26.994929 1455 kuberuntime_manager.go:1546] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"0cbe2f9f5f2c0b67bcd2e1b08b365ad6cb1003f64d7574dfbbff4edb1560d63b"} Jul 10 00:23:26.994999 kubelet[1455]: E0710 00:23:26.994970 1455 kuberuntime_manager.go:1146] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"42e01b8f-2f0e-4715-840b-6f672d61337a\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"0cbe2f9f5f2c0b67bcd2e1b08b365ad6cb1003f64d7574dfbbff4edb1560d63b\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Jul 10 00:23:26.995078 kubelet[1455]: E0710 00:23:26.994993 1455 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"42e01b8f-2f0e-4715-840b-6f672d61337a\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"0cbe2f9f5f2c0b67bcd2e1b08b365ad6cb1003f64d7574dfbbff4edb1560d63b\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-7fcdb87857-mwnr8" podUID="42e01b8f-2f0e-4715-840b-6f672d61337a" Jul 10 00:23:27.206355 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2408715362.mount: Deactivated successfully. Jul 10 00:23:27.339864 env[1217]: time="2025-07-10T00:23:27.339818046Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.30.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 10 00:23:27.341316 env[1217]: time="2025-07-10T00:23:27.341264046Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:1c6ddca599ddd18c061e797a7830b0aea985f8b023c5e43d815a9ed1088893a9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 10 00:23:27.342589 env[1217]: time="2025-07-10T00:23:27.342558366Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.30.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 10 00:23:27.343845 env[1217]: time="2025-07-10T00:23:27.343808166Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:e94d49349cc361ef2216d27dda4a097278984d778279f66e79b0616c827c6760,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 10 00:23:27.344345 env[1217]: time="2025-07-10T00:23:27.344300726Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.30.2\" returns image reference \"sha256:1c6ddca599ddd18c061e797a7830b0aea985f8b023c5e43d815a9ed1088893a9\"" Jul 10 00:23:27.352199 env[1217]: time="2025-07-10T00:23:27.352155086Z" level=info msg="CreateContainer within sandbox \"67bc978a79fabf84d0af4da93473008d57a1ee9bf4c79c1ac3d7a807b6165740\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Jul 10 00:23:27.375184 env[1217]: time="2025-07-10T00:23:27.375126406Z" level=info msg="CreateContainer within sandbox \"67bc978a79fabf84d0af4da93473008d57a1ee9bf4c79c1ac3d7a807b6165740\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"7487df16f2cc2d13445272ddd1b01837bc3691ad4b906769b2e270d216ae82de\"" Jul 10 00:23:27.376006 env[1217]: time="2025-07-10T00:23:27.375975926Z" level=info msg="StartContainer for \"7487df16f2cc2d13445272ddd1b01837bc3691ad4b906769b2e270d216ae82de\"" Jul 10 00:23:27.397557 systemd[1]: Started cri-containerd-7487df16f2cc2d13445272ddd1b01837bc3691ad4b906769b2e270d216ae82de.scope. Jul 10 00:23:27.451000 audit[2065]: AVC avc: denied { perfmon } for pid=2065 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:27.451000 audit[2065]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=1577 pid=2065 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:23:27.451000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3734383764663136663263633264313334343532373264646431623031 Jul 10 00:23:27.451000 audit[2065]: AVC avc: denied { bpf } for pid=2065 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:27.451000 audit[2065]: AVC avc: denied { bpf } for pid=2065 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:27.451000 audit[2065]: AVC avc: denied { bpf } for pid=2065 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:27.451000 audit[2065]: AVC avc: denied { perfmon } for pid=2065 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:27.451000 audit[2065]: AVC avc: denied { perfmon } for pid=2065 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:27.451000 audit[2065]: AVC avc: denied { perfmon } for pid=2065 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:27.451000 audit[2065]: AVC avc: denied { perfmon } for pid=2065 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:27.451000 audit[2065]: AVC avc: denied { perfmon } for pid=2065 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:27.451000 audit[2065]: AVC avc: denied { bpf } for pid=2065 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:27.451000 audit[2065]: AVC avc: denied { bpf } for pid=2065 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:27.451000 audit: BPF prog-id=72 op=LOAD Jul 10 00:23:27.451000 audit[2065]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=1577 pid=2065 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:23:27.451000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3734383764663136663263633264313334343532373264646431623031 Jul 10 00:23:27.451000 audit[2065]: AVC avc: denied { bpf } for pid=2065 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:27.451000 audit[2065]: AVC avc: denied { bpf } for pid=2065 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:27.451000 audit[2065]: AVC avc: denied { perfmon } for pid=2065 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:27.451000 audit[2065]: AVC avc: denied { perfmon } for pid=2065 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:27.451000 audit[2065]: AVC avc: denied { perfmon } for pid=2065 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:27.451000 audit[2065]: AVC avc: denied { perfmon } for pid=2065 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:27.451000 audit[2065]: AVC avc: denied { perfmon } for pid=2065 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:27.451000 audit[2065]: AVC avc: denied { bpf } for pid=2065 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:27.451000 audit[2065]: AVC avc: denied { bpf } for pid=2065 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:27.451000 audit: BPF prog-id=73 op=LOAD Jul 10 00:23:27.451000 audit[2065]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=1577 pid=2065 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:23:27.451000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3734383764663136663263633264313334343532373264646431623031 Jul 10 00:23:27.451000 audit: BPF prog-id=73 op=UNLOAD Jul 10 00:23:27.451000 audit: BPF prog-id=72 op=UNLOAD Jul 10 00:23:27.451000 audit[2065]: AVC avc: denied { bpf } for pid=2065 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:27.451000 audit[2065]: AVC avc: denied { bpf } for pid=2065 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:27.451000 audit[2065]: AVC avc: denied { bpf } for pid=2065 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:27.451000 audit[2065]: AVC avc: denied { perfmon } for pid=2065 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:27.451000 audit[2065]: AVC avc: denied { perfmon } for pid=2065 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:27.451000 audit[2065]: AVC avc: denied { perfmon } for pid=2065 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:27.451000 audit[2065]: AVC avc: denied { perfmon } for pid=2065 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:27.451000 audit[2065]: AVC avc: denied { perfmon } for pid=2065 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:27.451000 audit[2065]: AVC avc: denied { bpf } for pid=2065 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:27.451000 audit[2065]: AVC avc: denied { bpf } for pid=2065 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:27.451000 audit: BPF prog-id=74 op=LOAD Jul 10 00:23:27.451000 audit[2065]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=1577 pid=2065 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:23:27.451000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3734383764663136663263633264313334343532373264646431623031 Jul 10 00:23:27.473686 env[1217]: time="2025-07-10T00:23:27.473536246Z" level=info msg="StartContainer for \"7487df16f2cc2d13445272ddd1b01837bc3691ad4b906769b2e270d216ae82de\" returns successfully" Jul 10 00:23:27.638085 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Jul 10 00:23:27.638228 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. Jul 10 00:23:27.777475 kubelet[1455]: E0710 00:23:27.777283 1455 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 00:23:28.778142 kubelet[1455]: E0710 00:23:28.778069 1455 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 00:23:28.861000 audit[2192]: AVC avc: denied { write } for pid=2192 comm="tee" name="fd" dev="proc" ino=16526 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Jul 10 00:23:28.862871 kernel: kauditd_printk_skb: 45 callbacks suppressed Jul 10 00:23:28.862962 kernel: audit: type=1400 audit(1752107008.861:543): avc: denied { write } for pid=2192 comm="tee" name="fd" dev="proc" ino=16526 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Jul 10 00:23:28.861000 audit[2192]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffc1d277e5 a2=241 a3=1b6 items=1 ppid=2157 pid=2192 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:23:28.867217 kernel: audit: type=1300 audit(1752107008.861:543): arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffc1d277e5 a2=241 a3=1b6 items=1 ppid=2157 pid=2192 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:23:28.867342 kernel: audit: type=1307 audit(1752107008.861:543): cwd="/etc/service/enabled/confd/log" Jul 10 00:23:28.861000 audit: CWD cwd="/etc/service/enabled/confd/log" Jul 10 00:23:28.867907 kernel: audit: type=1302 audit(1752107008.861:543): item=0 name="/dev/fd/63" inode=16523 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:23:28.861000 audit: PATH item=0 name="/dev/fd/63" inode=16523 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:23:28.869645 kernel: audit: type=1327 audit(1752107008.861:543): proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Jul 10 00:23:28.861000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Jul 10 00:23:28.863000 audit[2194]: AVC avc: denied { write } for pid=2194 comm="tee" name="fd" dev="proc" ino=16530 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Jul 10 00:23:28.872963 kernel: audit: type=1400 audit(1752107008.863:544): avc: denied { write } for pid=2194 comm="tee" name="fd" dev="proc" ino=16530 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Jul 10 00:23:28.863000 audit[2194]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=fffffc9fc7e6 a2=241 a3=1b6 items=1 ppid=2167 pid=2194 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:23:28.876991 kernel: audit: type=1300 audit(1752107008.863:544): arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=fffffc9fc7e6 a2=241 a3=1b6 items=1 ppid=2167 pid=2194 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:23:28.863000 audit: CWD cwd="/etc/service/enabled/bird/log" Jul 10 00:23:28.878221 kernel: audit: type=1307 audit(1752107008.863:544): cwd="/etc/service/enabled/bird/log" Jul 10 00:23:28.878283 kernel: audit: type=1302 audit(1752107008.863:544): item=0 name="/dev/fd/63" inode=14822 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:23:28.863000 audit: PATH item=0 name="/dev/fd/63" inode=14822 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:23:28.863000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Jul 10 00:23:28.881969 kernel: audit: type=1327 audit(1752107008.863:544): proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Jul 10 00:23:28.867000 audit[2201]: AVC avc: denied { write } for pid=2201 comm="tee" name="fd" dev="proc" ino=16537 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Jul 10 00:23:28.867000 audit[2201]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=fffff66a87e7 a2=241 a3=1b6 items=1 ppid=2153 pid=2201 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:23:28.867000 audit: CWD cwd="/etc/service/enabled/cni/log" Jul 10 00:23:28.867000 audit: PATH item=0 name="/dev/fd/63" inode=16534 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:23:28.867000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Jul 10 00:23:28.885000 audit[2207]: AVC avc: denied { write } for pid=2207 comm="tee" name="fd" dev="proc" ino=14829 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Jul 10 00:23:28.885000 audit[2207]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffed7d17e5 a2=241 a3=1b6 items=1 ppid=2162 pid=2207 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:23:28.885000 audit: CWD cwd="/etc/service/enabled/bird6/log" Jul 10 00:23:28.885000 audit: PATH item=0 name="/dev/fd/63" inode=16543 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:23:28.885000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Jul 10 00:23:28.890000 audit[2217]: AVC avc: denied { write } for pid=2217 comm="tee" name="fd" dev="proc" ino=16550 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Jul 10 00:23:28.890000 audit[2217]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffd2c467d6 a2=241 a3=1b6 items=1 ppid=2152 pid=2217 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:23:28.890000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Jul 10 00:23:28.890000 audit: PATH item=0 name="/dev/fd/63" inode=15503 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:23:28.890000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Jul 10 00:23:28.901000 audit[2226]: AVC avc: denied { write } for pid=2226 comm="tee" name="fd" dev="proc" ino=16556 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Jul 10 00:23:28.901000 audit[2226]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffd0d787d5 a2=241 a3=1b6 items=1 ppid=2154 pid=2226 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:23:28.901000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Jul 10 00:23:28.901000 audit: PATH item=0 name="/dev/fd/63" inode=13836 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:23:28.901000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Jul 10 00:23:28.902000 audit[2231]: AVC avc: denied { write } for pid=2231 comm="tee" name="fd" dev="proc" ino=16560 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Jul 10 00:23:28.902000 audit[2231]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffc60af7e5 a2=241 a3=1b6 items=1 ppid=2163 pid=2231 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:23:28.902000 audit: CWD cwd="/etc/service/enabled/felix/log" Jul 10 00:23:28.902000 audit: PATH item=0 name="/dev/fd/63" inode=15508 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:23:28.902000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Jul 10 00:23:28.991878 systemd[1]: run-containerd-runc-k8s.io-7487df16f2cc2d13445272ddd1b01837bc3691ad4b906769b2e270d216ae82de-runc.9dD3Xe.mount: Deactivated successfully. Jul 10 00:23:29.075000 audit[2293]: AVC avc: denied { bpf } for pid=2293 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:29.075000 audit[2293]: AVC avc: denied { bpf } for pid=2293 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:29.075000 audit[2293]: AVC avc: denied { perfmon } for pid=2293 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:29.075000 audit[2293]: AVC avc: denied { perfmon } for pid=2293 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:29.075000 audit[2293]: AVC avc: denied { perfmon } for pid=2293 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:29.075000 audit[2293]: AVC avc: denied { perfmon } for pid=2293 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:29.075000 audit[2293]: AVC avc: denied { perfmon } for pid=2293 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:29.075000 audit[2293]: AVC avc: denied { bpf } for pid=2293 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:29.075000 audit[2293]: AVC avc: denied { bpf } for pid=2293 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:29.075000 audit: BPF prog-id=75 op=LOAD Jul 10 00:23:29.075000 audit[2293]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffd7897288 a2=98 a3=ffffd7897278 items=0 ppid=2166 pid=2293 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:23:29.075000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F74632F676C6F62616C732F63616C695F63746C625F70726F677300747970650070726F675F6172726179006B657900340076616C7565003400656E74726965730033006E616D650063616C695F63746C625F70726F677300666C6167730030 Jul 10 00:23:29.076000 audit: BPF prog-id=75 op=UNLOAD Jul 10 00:23:29.076000 audit[2293]: AVC avc: denied { bpf } for pid=2293 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:29.076000 audit[2293]: AVC avc: denied { bpf } for pid=2293 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:29.076000 audit[2293]: AVC avc: denied { perfmon } for pid=2293 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:29.076000 audit[2293]: AVC avc: denied { perfmon } for pid=2293 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:29.076000 audit[2293]: AVC avc: denied { perfmon } for pid=2293 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:29.076000 audit[2293]: AVC avc: denied { perfmon } for pid=2293 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:29.076000 audit[2293]: AVC avc: denied { perfmon } for pid=2293 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:29.076000 audit[2293]: AVC avc: denied { bpf } for pid=2293 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:29.076000 audit[2293]: AVC avc: denied { bpf } for pid=2293 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:29.076000 audit: BPF prog-id=76 op=LOAD Jul 10 00:23:29.076000 audit[2293]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffd7897138 a2=74 a3=95 items=0 ppid=2166 pid=2293 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:23:29.076000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F74632F676C6F62616C732F63616C695F63746C625F70726F677300747970650070726F675F6172726179006B657900340076616C7565003400656E74726965730033006E616D650063616C695F63746C625F70726F677300666C6167730030 Jul 10 00:23:29.076000 audit: BPF prog-id=76 op=UNLOAD Jul 10 00:23:29.076000 audit[2293]: AVC avc: denied { bpf } for pid=2293 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:29.076000 audit[2293]: AVC avc: denied { bpf } for pid=2293 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:29.076000 audit[2293]: AVC avc: denied { perfmon } for pid=2293 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:29.076000 audit[2293]: AVC avc: denied { perfmon } for pid=2293 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:29.076000 audit[2293]: AVC avc: denied { perfmon } for pid=2293 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:29.076000 audit[2293]: AVC avc: denied { perfmon } for pid=2293 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:29.076000 audit[2293]: AVC avc: denied { perfmon } for pid=2293 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:29.076000 audit[2293]: AVC avc: denied { bpf } for pid=2293 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:29.076000 audit[2293]: AVC avc: denied { bpf } for pid=2293 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:29.076000 audit: BPF prog-id=77 op=LOAD Jul 10 00:23:29.076000 audit[2293]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffd7897168 a2=40 a3=ffffd7897198 items=0 ppid=2166 pid=2293 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:23:29.076000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F74632F676C6F62616C732F63616C695F63746C625F70726F677300747970650070726F675F6172726179006B657900340076616C7565003400656E74726965730033006E616D650063616C695F63746C625F70726F677300666C6167730030 Jul 10 00:23:29.076000 audit: BPF prog-id=77 op=UNLOAD Jul 10 00:23:29.076000 audit[2293]: AVC avc: denied { perfmon } for pid=2293 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:29.076000 audit[2293]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=0 a1=ffffd7897280 a2=50 a3=0 items=0 ppid=2166 pid=2293 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:23:29.076000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F74632F676C6F62616C732F63616C695F63746C625F70726F677300747970650070726F675F6172726179006B657900340076616C7565003400656E74726965730033006E616D650063616C695F63746C625F70726F677300666C6167730030 Jul 10 00:23:29.077000 audit[2294]: AVC avc: denied { bpf } for pid=2294 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:29.077000 audit[2294]: AVC avc: denied { bpf } for pid=2294 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:29.077000 audit[2294]: AVC avc: denied { perfmon } for pid=2294 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:29.077000 audit[2294]: AVC avc: denied { perfmon } for pid=2294 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:29.077000 audit[2294]: AVC avc: denied { perfmon } for pid=2294 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:29.077000 audit[2294]: AVC avc: denied { perfmon } for pid=2294 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:29.077000 audit[2294]: AVC avc: denied { perfmon } for pid=2294 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:29.077000 audit[2294]: AVC avc: denied { bpf } for pid=2294 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:29.077000 audit[2294]: AVC avc: denied { bpf } for pid=2294 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:29.077000 audit: BPF prog-id=78 op=LOAD Jul 10 00:23:29.077000 audit[2294]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffc3f0f928 a2=98 a3=ffffc3f0f918 items=0 ppid=2166 pid=2294 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:23:29.077000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Jul 10 00:23:29.077000 audit: BPF prog-id=78 op=UNLOAD Jul 10 00:23:29.077000 audit[2294]: AVC avc: denied { bpf } for pid=2294 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:29.077000 audit[2294]: AVC avc: denied { bpf } for pid=2294 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:29.077000 audit[2294]: AVC avc: denied { perfmon } for pid=2294 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:29.077000 audit[2294]: AVC avc: denied { perfmon } for pid=2294 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:29.077000 audit[2294]: AVC avc: denied { perfmon } for pid=2294 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:29.077000 audit[2294]: AVC avc: denied { perfmon } for pid=2294 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:29.077000 audit[2294]: AVC avc: denied { perfmon } for pid=2294 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:29.077000 audit[2294]: AVC avc: denied { bpf } for pid=2294 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:29.077000 audit[2294]: AVC avc: denied { bpf } for pid=2294 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:29.077000 audit: BPF prog-id=79 op=LOAD Jul 10 00:23:29.077000 audit[2294]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=ffffc3f0f5b8 a2=74 a3=95 items=0 ppid=2166 pid=2294 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:23:29.077000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Jul 10 00:23:29.077000 audit: BPF prog-id=79 op=UNLOAD Jul 10 00:23:29.077000 audit[2294]: AVC avc: denied { bpf } for pid=2294 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:29.077000 audit[2294]: AVC avc: denied { bpf } for pid=2294 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:29.077000 audit[2294]: AVC avc: denied { perfmon } for pid=2294 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:29.077000 audit[2294]: AVC avc: denied { perfmon } for pid=2294 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:29.077000 audit[2294]: AVC avc: denied { perfmon } for pid=2294 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:29.077000 audit[2294]: AVC avc: denied { perfmon } for pid=2294 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:29.077000 audit[2294]: AVC avc: denied { perfmon } for pid=2294 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:29.077000 audit[2294]: AVC avc: denied { bpf } for pid=2294 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:29.077000 audit[2294]: AVC avc: denied { bpf } for pid=2294 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:29.077000 audit: BPF prog-id=80 op=LOAD Jul 10 00:23:29.077000 audit[2294]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=ffffc3f0f618 a2=94 a3=2 items=0 ppid=2166 pid=2294 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:23:29.077000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Jul 10 00:23:29.077000 audit: BPF prog-id=80 op=UNLOAD Jul 10 00:23:29.161000 audit[2294]: AVC avc: denied { bpf } for pid=2294 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:29.161000 audit[2294]: AVC avc: denied { bpf } for pid=2294 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:29.161000 audit[2294]: AVC avc: denied { perfmon } for pid=2294 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:29.161000 audit[2294]: AVC avc: denied { perfmon } for pid=2294 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:29.161000 audit[2294]: AVC avc: denied { perfmon } for pid=2294 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:29.161000 audit[2294]: AVC avc: denied { perfmon } for pid=2294 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:29.161000 audit[2294]: AVC avc: denied { perfmon } for pid=2294 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:29.161000 audit[2294]: AVC avc: denied { bpf } for pid=2294 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:29.161000 audit[2294]: AVC avc: denied { bpf } for pid=2294 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:29.161000 audit: BPF prog-id=81 op=LOAD Jul 10 00:23:29.161000 audit[2294]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=ffffc3f0f5d8 a2=40 a3=ffffc3f0f608 items=0 ppid=2166 pid=2294 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:23:29.161000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Jul 10 00:23:29.161000 audit: BPF prog-id=81 op=UNLOAD Jul 10 00:23:29.161000 audit[2294]: AVC avc: denied { perfmon } for pid=2294 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:29.161000 audit[2294]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=0 a1=ffffc3f0f6f0 a2=50 a3=0 items=0 ppid=2166 pid=2294 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:23:29.161000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Jul 10 00:23:29.170000 audit[2294]: AVC avc: denied { bpf } for pid=2294 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:29.170000 audit[2294]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffc3f0f648 a2=28 a3=ffffc3f0f778 items=0 ppid=2166 pid=2294 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:23:29.170000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Jul 10 00:23:29.170000 audit[2294]: AVC avc: denied { bpf } for pid=2294 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:29.170000 audit[2294]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffc3f0f678 a2=28 a3=ffffc3f0f7a8 items=0 ppid=2166 pid=2294 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:23:29.170000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Jul 10 00:23:29.170000 audit[2294]: AVC avc: denied { bpf } for pid=2294 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:29.170000 audit[2294]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffc3f0f528 a2=28 a3=ffffc3f0f658 items=0 ppid=2166 pid=2294 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:23:29.170000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Jul 10 00:23:29.170000 audit[2294]: AVC avc: denied { bpf } for pid=2294 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:29.170000 audit[2294]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffc3f0f698 a2=28 a3=ffffc3f0f7c8 items=0 ppid=2166 pid=2294 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:23:29.170000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Jul 10 00:23:29.170000 audit[2294]: AVC avc: denied { bpf } for pid=2294 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:29.170000 audit[2294]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffc3f0f678 a2=28 a3=ffffc3f0f7a8 items=0 ppid=2166 pid=2294 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:23:29.170000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Jul 10 00:23:29.170000 audit[2294]: AVC avc: denied { bpf } for pid=2294 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:29.170000 audit[2294]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffc3f0f668 a2=28 a3=ffffc3f0f798 items=0 ppid=2166 pid=2294 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:23:29.170000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Jul 10 00:23:29.170000 audit[2294]: AVC avc: denied { bpf } for pid=2294 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:29.170000 audit[2294]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffc3f0f698 a2=28 a3=ffffc3f0f7c8 items=0 ppid=2166 pid=2294 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:23:29.170000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Jul 10 00:23:29.170000 audit[2294]: AVC avc: denied { bpf } for pid=2294 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:29.170000 audit[2294]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffc3f0f678 a2=28 a3=ffffc3f0f7a8 items=0 ppid=2166 pid=2294 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:23:29.170000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Jul 10 00:23:29.170000 audit[2294]: AVC avc: denied { bpf } for pid=2294 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:29.170000 audit[2294]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffc3f0f698 a2=28 a3=ffffc3f0f7c8 items=0 ppid=2166 pid=2294 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:23:29.170000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Jul 10 00:23:29.170000 audit[2294]: AVC avc: denied { bpf } for pid=2294 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:29.170000 audit[2294]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffc3f0f668 a2=28 a3=ffffc3f0f798 items=0 ppid=2166 pid=2294 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:23:29.170000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Jul 10 00:23:29.170000 audit[2294]: AVC avc: denied { bpf } for pid=2294 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:29.170000 audit[2294]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffc3f0f6e8 a2=28 a3=ffffc3f0f828 items=0 ppid=2166 pid=2294 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:23:29.170000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Jul 10 00:23:29.170000 audit[2294]: AVC avc: denied { perfmon } for pid=2294 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:29.170000 audit[2294]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=0 a1=ffffc3f0f420 a2=50 a3=0 items=0 ppid=2166 pid=2294 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:23:29.170000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Jul 10 00:23:29.170000 audit[2294]: AVC avc: denied { bpf } for pid=2294 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:29.170000 audit[2294]: AVC avc: denied { bpf } for pid=2294 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:29.170000 audit[2294]: AVC avc: denied { perfmon } for pid=2294 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:29.170000 audit[2294]: AVC avc: denied { perfmon } for pid=2294 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:29.170000 audit[2294]: AVC avc: denied { perfmon } for pid=2294 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:29.170000 audit[2294]: AVC avc: denied { perfmon } for pid=2294 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:29.170000 audit[2294]: AVC avc: denied { perfmon } for pid=2294 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:29.170000 audit[2294]: AVC avc: denied { bpf } for pid=2294 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:29.170000 audit[2294]: AVC avc: denied { bpf } for pid=2294 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:29.170000 audit: BPF prog-id=82 op=LOAD Jul 10 00:23:29.170000 audit[2294]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=ffffc3f0f428 a2=94 a3=5 items=0 ppid=2166 pid=2294 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:23:29.170000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Jul 10 00:23:29.170000 audit: BPF prog-id=82 op=UNLOAD Jul 10 00:23:29.170000 audit[2294]: AVC avc: denied { perfmon } for pid=2294 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:29.170000 audit[2294]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=0 a1=ffffc3f0f530 a2=50 a3=0 items=0 ppid=2166 pid=2294 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:23:29.170000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Jul 10 00:23:29.170000 audit[2294]: AVC avc: denied { bpf } for pid=2294 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:29.170000 audit[2294]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=16 a1=ffffc3f0f678 a2=4 a3=3 items=0 ppid=2166 pid=2294 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:23:29.170000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Jul 10 00:23:29.170000 audit[2294]: AVC avc: denied { bpf } for pid=2294 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:29.170000 audit[2294]: AVC avc: denied { bpf } for pid=2294 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:29.170000 audit[2294]: AVC avc: denied { perfmon } for pid=2294 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:29.170000 audit[2294]: AVC avc: denied { bpf } for pid=2294 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:29.170000 audit[2294]: AVC avc: denied { perfmon } for pid=2294 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:29.170000 audit[2294]: AVC avc: denied { perfmon } for pid=2294 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:29.170000 audit[2294]: AVC avc: denied { perfmon } for pid=2294 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:29.170000 audit[2294]: AVC avc: denied { perfmon } for pid=2294 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:29.170000 audit[2294]: AVC avc: denied { perfmon } for pid=2294 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:29.170000 audit[2294]: AVC avc: denied { bpf } for pid=2294 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:29.170000 audit[2294]: AVC avc: denied { confidentiality } for pid=2294 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:23:29.170000 audit[2294]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=ffffc3f0f658 a2=94 a3=6 items=0 ppid=2166 pid=2294 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:23:29.170000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Jul 10 00:23:29.170000 audit[2294]: AVC avc: denied { bpf } for pid=2294 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:29.170000 audit[2294]: AVC avc: denied { bpf } for pid=2294 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:29.170000 audit[2294]: AVC avc: denied { perfmon } for pid=2294 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:29.170000 audit[2294]: AVC avc: denied { bpf } for pid=2294 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:29.170000 audit[2294]: AVC avc: denied { perfmon } for pid=2294 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:29.170000 audit[2294]: AVC avc: denied { perfmon } for pid=2294 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:29.170000 audit[2294]: AVC avc: denied { perfmon } for pid=2294 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:29.170000 audit[2294]: AVC avc: denied { perfmon } for pid=2294 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:29.170000 audit[2294]: AVC avc: denied { perfmon } for pid=2294 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:29.170000 audit[2294]: AVC avc: denied { bpf } for pid=2294 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:29.170000 audit[2294]: AVC avc: denied { confidentiality } for pid=2294 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:23:29.170000 audit[2294]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=ffffc3f0ee28 a2=94 a3=83 items=0 ppid=2166 pid=2294 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:23:29.170000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Jul 10 00:23:29.171000 audit[2294]: AVC avc: denied { bpf } for pid=2294 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:29.171000 audit[2294]: AVC avc: denied { bpf } for pid=2294 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:29.171000 audit[2294]: AVC avc: denied { perfmon } for pid=2294 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:29.171000 audit[2294]: AVC avc: denied { bpf } for pid=2294 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:29.171000 audit[2294]: AVC avc: denied { perfmon } for pid=2294 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:29.171000 audit[2294]: AVC avc: denied { perfmon } for pid=2294 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:29.171000 audit[2294]: AVC avc: denied { perfmon } for pid=2294 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:29.171000 audit[2294]: AVC avc: denied { perfmon } for pid=2294 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:29.171000 audit[2294]: AVC avc: denied { perfmon } for pid=2294 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:29.171000 audit[2294]: AVC avc: denied { bpf } for pid=2294 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:29.171000 audit[2294]: AVC avc: denied { confidentiality } for pid=2294 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:23:29.171000 audit[2294]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=ffffc3f0ee28 a2=94 a3=83 items=0 ppid=2166 pid=2294 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:23:29.171000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Jul 10 00:23:29.189000 audit[2297]: AVC avc: denied { bpf } for pid=2297 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:29.189000 audit[2297]: AVC avc: denied { bpf } for pid=2297 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:29.189000 audit[2297]: AVC avc: denied { perfmon } for pid=2297 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:29.189000 audit[2297]: AVC avc: denied { perfmon } for pid=2297 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:29.189000 audit[2297]: AVC avc: denied { perfmon } for pid=2297 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:29.189000 audit[2297]: AVC avc: denied { perfmon } for pid=2297 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:29.189000 audit[2297]: AVC avc: denied { perfmon } for pid=2297 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:29.189000 audit[2297]: AVC avc: denied { bpf } for pid=2297 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:29.189000 audit[2297]: AVC avc: denied { bpf } for pid=2297 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:29.189000 audit: BPF prog-id=83 op=LOAD Jul 10 00:23:29.189000 audit[2297]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffe00205a8 a2=98 a3=ffffe0020598 items=0 ppid=2166 pid=2297 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:23:29.189000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Jul 10 00:23:29.189000 audit: BPF prog-id=83 op=UNLOAD Jul 10 00:23:29.189000 audit[2297]: AVC avc: denied { bpf } for pid=2297 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:29.189000 audit[2297]: AVC avc: denied { bpf } for pid=2297 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:29.189000 audit[2297]: AVC avc: denied { perfmon } for pid=2297 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:29.189000 audit[2297]: AVC avc: denied { perfmon } for pid=2297 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:29.189000 audit[2297]: AVC avc: denied { perfmon } for pid=2297 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:29.189000 audit[2297]: AVC avc: denied { perfmon } for pid=2297 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:29.189000 audit[2297]: AVC avc: denied { perfmon } for pid=2297 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:29.189000 audit[2297]: AVC avc: denied { bpf } for pid=2297 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:29.189000 audit[2297]: AVC avc: denied { bpf } for pid=2297 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:29.189000 audit: BPF prog-id=84 op=LOAD Jul 10 00:23:29.189000 audit[2297]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffe0020458 a2=74 a3=95 items=0 ppid=2166 pid=2297 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:23:29.189000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Jul 10 00:23:29.189000 audit: BPF prog-id=84 op=UNLOAD Jul 10 00:23:29.189000 audit[2297]: AVC avc: denied { bpf } for pid=2297 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:29.189000 audit[2297]: AVC avc: denied { bpf } for pid=2297 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:29.189000 audit[2297]: AVC avc: denied { perfmon } for pid=2297 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:29.189000 audit[2297]: AVC avc: denied { perfmon } for pid=2297 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:29.189000 audit[2297]: AVC avc: denied { perfmon } for pid=2297 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:29.189000 audit[2297]: AVC avc: denied { perfmon } for pid=2297 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:29.189000 audit[2297]: AVC avc: denied { perfmon } for pid=2297 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:29.189000 audit[2297]: AVC avc: denied { bpf } for pid=2297 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:29.189000 audit[2297]: AVC avc: denied { bpf } for pid=2297 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:29.189000 audit: BPF prog-id=85 op=LOAD Jul 10 00:23:29.189000 audit[2297]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffe0020488 a2=40 a3=ffffe00204b8 items=0 ppid=2166 pid=2297 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:23:29.189000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Jul 10 00:23:29.189000 audit: BPF prog-id=85 op=UNLOAD Jul 10 00:23:29.246217 systemd-networkd[1044]: vxlan.calico: Link UP Jul 10 00:23:29.246226 systemd-networkd[1044]: vxlan.calico: Gained carrier Jul 10 00:23:29.262000 audit[2325]: AVC avc: denied { bpf } for pid=2325 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:29.262000 audit[2325]: AVC avc: denied { bpf } for pid=2325 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:29.262000 audit[2325]: AVC avc: denied { perfmon } for pid=2325 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:29.262000 audit[2325]: AVC avc: denied { perfmon } for pid=2325 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:29.262000 audit[2325]: AVC avc: denied { perfmon } for pid=2325 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:29.262000 audit[2325]: AVC avc: denied { perfmon } for pid=2325 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:29.262000 audit[2325]: AVC avc: denied { perfmon } for pid=2325 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:29.262000 audit[2325]: AVC avc: denied { bpf } for pid=2325 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:29.262000 audit[2325]: AVC avc: denied { bpf } for pid=2325 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:29.262000 audit: BPF prog-id=86 op=LOAD Jul 10 00:23:29.262000 audit[2325]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffe6219678 a2=98 a3=ffffe6219668 items=0 ppid=2166 pid=2325 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:23:29.262000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 10 00:23:29.262000 audit: BPF prog-id=86 op=UNLOAD Jul 10 00:23:29.262000 audit[2325]: AVC avc: denied { bpf } for pid=2325 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:29.262000 audit[2325]: AVC avc: denied { bpf } for pid=2325 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:29.262000 audit[2325]: AVC avc: denied { perfmon } for pid=2325 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:29.262000 audit[2325]: AVC avc: denied { perfmon } for pid=2325 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:29.262000 audit[2325]: AVC avc: denied { perfmon } for pid=2325 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:29.262000 audit[2325]: AVC avc: denied { perfmon } for pid=2325 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:29.262000 audit[2325]: AVC avc: denied { perfmon } for pid=2325 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:29.262000 audit[2325]: AVC avc: denied { bpf } for pid=2325 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:29.262000 audit[2325]: AVC avc: denied { bpf } for pid=2325 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:29.262000 audit: BPF prog-id=87 op=LOAD Jul 10 00:23:29.262000 audit[2325]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffe6219358 a2=74 a3=95 items=0 ppid=2166 pid=2325 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:23:29.262000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 10 00:23:29.262000 audit: BPF prog-id=87 op=UNLOAD Jul 10 00:23:29.262000 audit[2325]: AVC avc: denied { bpf } for pid=2325 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:29.262000 audit[2325]: AVC avc: denied { bpf } for pid=2325 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:29.262000 audit[2325]: AVC avc: denied { perfmon } for pid=2325 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:29.262000 audit[2325]: AVC avc: denied { perfmon } for pid=2325 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:29.262000 audit[2325]: AVC avc: denied { perfmon } for pid=2325 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:29.262000 audit[2325]: AVC avc: denied { perfmon } for pid=2325 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:29.262000 audit[2325]: AVC avc: denied { perfmon } for pid=2325 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:29.262000 audit[2325]: AVC avc: denied { bpf } for pid=2325 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:29.262000 audit[2325]: AVC avc: denied { bpf } for pid=2325 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:29.262000 audit: BPF prog-id=88 op=LOAD Jul 10 00:23:29.262000 audit[2325]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffe62193b8 a2=94 a3=2 items=0 ppid=2166 pid=2325 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:23:29.262000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 10 00:23:29.262000 audit: BPF prog-id=88 op=UNLOAD Jul 10 00:23:29.262000 audit[2325]: AVC avc: denied { bpf } for pid=2325 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:29.262000 audit[2325]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=ffffe62193e8 a2=28 a3=ffffe6219518 items=0 ppid=2166 pid=2325 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:23:29.262000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 10 00:23:29.262000 audit[2325]: AVC avc: denied { bpf } for pid=2325 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:29.262000 audit[2325]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffe6219418 a2=28 a3=ffffe6219548 items=0 ppid=2166 pid=2325 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:23:29.262000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 10 00:23:29.262000 audit[2325]: AVC avc: denied { bpf } for pid=2325 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:29.262000 audit[2325]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffe62192c8 a2=28 a3=ffffe62193f8 items=0 ppid=2166 pid=2325 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:23:29.262000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 10 00:23:29.262000 audit[2325]: AVC avc: denied { bpf } for pid=2325 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:29.262000 audit[2325]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=ffffe6219438 a2=28 a3=ffffe6219568 items=0 ppid=2166 pid=2325 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:23:29.262000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 10 00:23:29.263000 audit[2325]: AVC avc: denied { bpf } for pid=2325 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:29.263000 audit[2325]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=ffffe6219418 a2=28 a3=ffffe6219548 items=0 ppid=2166 pid=2325 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:23:29.263000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 10 00:23:29.263000 audit[2325]: AVC avc: denied { bpf } for pid=2325 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:29.263000 audit[2325]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=ffffe6219408 a2=28 a3=ffffe6219538 items=0 ppid=2166 pid=2325 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:23:29.263000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 10 00:23:29.263000 audit[2325]: AVC avc: denied { bpf } for pid=2325 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:29.263000 audit[2325]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=ffffe6219438 a2=28 a3=ffffe6219568 items=0 ppid=2166 pid=2325 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:23:29.263000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 10 00:23:29.263000 audit[2325]: AVC avc: denied { bpf } for pid=2325 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:29.263000 audit[2325]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffe6219418 a2=28 a3=ffffe6219548 items=0 ppid=2166 pid=2325 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:23:29.263000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 10 00:23:29.263000 audit[2325]: AVC avc: denied { bpf } for pid=2325 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:29.263000 audit[2325]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffe6219438 a2=28 a3=ffffe6219568 items=0 ppid=2166 pid=2325 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:23:29.263000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 10 00:23:29.263000 audit[2325]: AVC avc: denied { bpf } for pid=2325 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:29.263000 audit[2325]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffe6219408 a2=28 a3=ffffe6219538 items=0 ppid=2166 pid=2325 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:23:29.263000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 10 00:23:29.263000 audit[2325]: AVC avc: denied { bpf } for pid=2325 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:29.263000 audit[2325]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=ffffe6219488 a2=28 a3=ffffe62195c8 items=0 ppid=2166 pid=2325 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:23:29.263000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 10 00:23:29.263000 audit[2325]: AVC avc: denied { bpf } for pid=2325 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:29.263000 audit[2325]: AVC avc: denied { bpf } for pid=2325 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:29.263000 audit[2325]: AVC avc: denied { perfmon } for pid=2325 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:29.263000 audit[2325]: AVC avc: denied { perfmon } for pid=2325 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:29.263000 audit[2325]: AVC avc: denied { perfmon } for pid=2325 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:29.263000 audit[2325]: AVC avc: denied { perfmon } for pid=2325 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:29.263000 audit[2325]: AVC avc: denied { perfmon } for pid=2325 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:29.263000 audit[2325]: AVC avc: denied { bpf } for pid=2325 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:29.263000 audit[2325]: AVC avc: denied { bpf } for pid=2325 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:29.263000 audit: BPF prog-id=89 op=LOAD Jul 10 00:23:29.263000 audit[2325]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=ffffe62192a8 a2=40 a3=ffffe62192d8 items=0 ppid=2166 pid=2325 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:23:29.263000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 10 00:23:29.263000 audit: BPF prog-id=89 op=UNLOAD Jul 10 00:23:29.263000 audit[2325]: AVC avc: denied { bpf } for pid=2325 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:29.263000 audit[2325]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=0 a1=ffffe62192d0 a2=50 a3=0 items=0 ppid=2166 pid=2325 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:23:29.263000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 10 00:23:29.263000 audit[2325]: AVC avc: denied { bpf } for pid=2325 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:29.263000 audit[2325]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=0 a1=ffffe62192d0 a2=50 a3=0 items=0 ppid=2166 pid=2325 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:23:29.263000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 10 00:23:29.263000 audit[2325]: AVC avc: denied { bpf } for pid=2325 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:29.263000 audit[2325]: AVC avc: denied { bpf } for pid=2325 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:29.263000 audit[2325]: AVC avc: denied { bpf } for pid=2325 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:29.263000 audit[2325]: AVC avc: denied { perfmon } for pid=2325 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:29.263000 audit[2325]: AVC avc: denied { perfmon } for pid=2325 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:29.263000 audit[2325]: AVC avc: denied { perfmon } for pid=2325 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:29.263000 audit[2325]: AVC avc: denied { perfmon } for pid=2325 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:29.263000 audit[2325]: AVC avc: denied { perfmon } for pid=2325 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:29.263000 audit[2325]: AVC avc: denied { bpf } for pid=2325 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:29.263000 audit[2325]: AVC avc: denied { bpf } for pid=2325 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:29.263000 audit: BPF prog-id=90 op=LOAD Jul 10 00:23:29.263000 audit[2325]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=ffffe6218a38 a2=94 a3=2 items=0 ppid=2166 pid=2325 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:23:29.263000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 10 00:23:29.263000 audit: BPF prog-id=90 op=UNLOAD Jul 10 00:23:29.263000 audit[2325]: AVC avc: denied { bpf } for pid=2325 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:29.263000 audit[2325]: AVC avc: denied { bpf } for pid=2325 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:29.263000 audit[2325]: AVC avc: denied { bpf } for pid=2325 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:29.263000 audit[2325]: AVC avc: denied { perfmon } for pid=2325 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:29.263000 audit[2325]: AVC avc: denied { perfmon } for pid=2325 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:29.263000 audit[2325]: AVC avc: denied { perfmon } for pid=2325 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:29.263000 audit[2325]: AVC avc: denied { perfmon } for pid=2325 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:29.263000 audit[2325]: AVC avc: denied { perfmon } for pid=2325 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:29.263000 audit[2325]: AVC avc: denied { bpf } for pid=2325 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:29.263000 audit[2325]: AVC avc: denied { bpf } for pid=2325 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:29.263000 audit: BPF prog-id=91 op=LOAD Jul 10 00:23:29.263000 audit[2325]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=ffffe6218bc8 a2=94 a3=30 items=0 ppid=2166 pid=2325 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:23:29.263000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 10 00:23:29.267000 audit[2327]: AVC avc: denied { bpf } for pid=2327 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:29.267000 audit[2327]: AVC avc: denied { bpf } for pid=2327 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:29.267000 audit[2327]: AVC avc: denied { perfmon } for pid=2327 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:29.267000 audit[2327]: AVC avc: denied { perfmon } for pid=2327 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:29.267000 audit[2327]: AVC avc: denied { perfmon } for pid=2327 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:29.267000 audit[2327]: AVC avc: denied { perfmon } for pid=2327 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:29.267000 audit[2327]: AVC avc: denied { perfmon } for pid=2327 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:29.267000 audit[2327]: AVC avc: denied { bpf } for pid=2327 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:29.267000 audit[2327]: AVC avc: denied { bpf } for pid=2327 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:29.267000 audit: BPF prog-id=92 op=LOAD Jul 10 00:23:29.267000 audit[2327]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffd0012d28 a2=98 a3=ffffd0012d18 items=0 ppid=2166 pid=2327 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:23:29.267000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 10 00:23:29.267000 audit: BPF prog-id=92 op=UNLOAD Jul 10 00:23:29.267000 audit[2327]: AVC avc: denied { bpf } for pid=2327 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:29.267000 audit[2327]: AVC avc: denied { bpf } for pid=2327 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:29.267000 audit[2327]: AVC avc: denied { perfmon } for pid=2327 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:29.267000 audit[2327]: AVC avc: denied { perfmon } for pid=2327 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:29.267000 audit[2327]: AVC avc: denied { perfmon } for pid=2327 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:29.267000 audit[2327]: AVC avc: denied { perfmon } for pid=2327 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:29.267000 audit[2327]: AVC avc: denied { perfmon } for pid=2327 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:29.267000 audit[2327]: AVC avc: denied { bpf } for pid=2327 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:29.267000 audit[2327]: AVC avc: denied { bpf } for pid=2327 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:29.267000 audit: BPF prog-id=93 op=LOAD Jul 10 00:23:29.267000 audit[2327]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=ffffd00129b8 a2=74 a3=95 items=0 ppid=2166 pid=2327 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:23:29.267000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 10 00:23:29.267000 audit: BPF prog-id=93 op=UNLOAD Jul 10 00:23:29.267000 audit[2327]: AVC avc: denied { bpf } for pid=2327 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:29.267000 audit[2327]: AVC avc: denied { bpf } for pid=2327 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:29.267000 audit[2327]: AVC avc: denied { perfmon } for pid=2327 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:29.267000 audit[2327]: AVC avc: denied { perfmon } for pid=2327 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:29.267000 audit[2327]: AVC avc: denied { perfmon } for pid=2327 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:29.267000 audit[2327]: AVC avc: denied { perfmon } for pid=2327 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:29.267000 audit[2327]: AVC avc: denied { perfmon } for pid=2327 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:29.267000 audit[2327]: AVC avc: denied { bpf } for pid=2327 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:29.267000 audit[2327]: AVC avc: denied { bpf } for pid=2327 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:29.267000 audit: BPF prog-id=94 op=LOAD Jul 10 00:23:29.267000 audit[2327]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=ffffd0012a18 a2=94 a3=2 items=0 ppid=2166 pid=2327 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:23:29.267000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 10 00:23:29.267000 audit: BPF prog-id=94 op=UNLOAD Jul 10 00:23:29.353000 audit[2327]: AVC avc: denied { bpf } for pid=2327 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:29.353000 audit[2327]: AVC avc: denied { bpf } for pid=2327 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:29.353000 audit[2327]: AVC avc: denied { perfmon } for pid=2327 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:29.353000 audit[2327]: AVC avc: denied { perfmon } for pid=2327 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:29.353000 audit[2327]: AVC avc: denied { perfmon } for pid=2327 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:29.353000 audit[2327]: AVC avc: denied { perfmon } for pid=2327 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:29.353000 audit[2327]: AVC avc: denied { perfmon } for pid=2327 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:29.353000 audit[2327]: AVC avc: denied { bpf } for pid=2327 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:29.353000 audit[2327]: AVC avc: denied { bpf } for pid=2327 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:29.353000 audit: BPF prog-id=95 op=LOAD Jul 10 00:23:29.353000 audit[2327]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=ffffd00129d8 a2=40 a3=ffffd0012a08 items=0 ppid=2166 pid=2327 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:23:29.353000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 10 00:23:29.353000 audit: BPF prog-id=95 op=UNLOAD Jul 10 00:23:29.353000 audit[2327]: AVC avc: denied { perfmon } for pid=2327 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:29.353000 audit[2327]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=0 a1=ffffd0012af0 a2=50 a3=0 items=0 ppid=2166 pid=2327 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:23:29.353000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 10 00:23:29.363000 audit[2327]: AVC avc: denied { bpf } for pid=2327 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:29.363000 audit[2327]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffd0012a48 a2=28 a3=ffffd0012b78 items=0 ppid=2166 pid=2327 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:23:29.363000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 10 00:23:29.363000 audit[2327]: AVC avc: denied { bpf } for pid=2327 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:29.363000 audit[2327]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffd0012a78 a2=28 a3=ffffd0012ba8 items=0 ppid=2166 pid=2327 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:23:29.363000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 10 00:23:29.363000 audit[2327]: AVC avc: denied { bpf } for pid=2327 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:29.363000 audit[2327]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffd0012928 a2=28 a3=ffffd0012a58 items=0 ppid=2166 pid=2327 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:23:29.363000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 10 00:23:29.363000 audit[2327]: AVC avc: denied { bpf } for pid=2327 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:29.363000 audit[2327]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffd0012a98 a2=28 a3=ffffd0012bc8 items=0 ppid=2166 pid=2327 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:23:29.363000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 10 00:23:29.363000 audit[2327]: AVC avc: denied { bpf } for pid=2327 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:29.363000 audit[2327]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffd0012a78 a2=28 a3=ffffd0012ba8 items=0 ppid=2166 pid=2327 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:23:29.363000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 10 00:23:29.363000 audit[2327]: AVC avc: denied { bpf } for pid=2327 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:29.363000 audit[2327]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffd0012a68 a2=28 a3=ffffd0012b98 items=0 ppid=2166 pid=2327 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:23:29.363000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 10 00:23:29.363000 audit[2327]: AVC avc: denied { bpf } for pid=2327 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:29.363000 audit[2327]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffd0012a98 a2=28 a3=ffffd0012bc8 items=0 ppid=2166 pid=2327 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:23:29.363000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 10 00:23:29.363000 audit[2327]: AVC avc: denied { bpf } for pid=2327 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:29.363000 audit[2327]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffd0012a78 a2=28 a3=ffffd0012ba8 items=0 ppid=2166 pid=2327 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:23:29.363000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 10 00:23:29.363000 audit[2327]: AVC avc: denied { bpf } for pid=2327 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:29.363000 audit[2327]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffd0012a98 a2=28 a3=ffffd0012bc8 items=0 ppid=2166 pid=2327 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:23:29.363000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 10 00:23:29.363000 audit[2327]: AVC avc: denied { bpf } for pid=2327 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:29.363000 audit[2327]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffd0012a68 a2=28 a3=ffffd0012b98 items=0 ppid=2166 pid=2327 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:23:29.363000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 10 00:23:29.363000 audit[2327]: AVC avc: denied { bpf } for pid=2327 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:29.363000 audit[2327]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffd0012ae8 a2=28 a3=ffffd0012c28 items=0 ppid=2166 pid=2327 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:23:29.363000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 10 00:23:29.363000 audit[2327]: AVC avc: denied { perfmon } for pid=2327 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:29.363000 audit[2327]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=0 a1=ffffd0012820 a2=50 a3=0 items=0 ppid=2166 pid=2327 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:23:29.363000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 10 00:23:29.363000 audit[2327]: AVC avc: denied { bpf } for pid=2327 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:29.363000 audit[2327]: AVC avc: denied { bpf } for pid=2327 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:29.363000 audit[2327]: AVC avc: denied { perfmon } for pid=2327 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:29.363000 audit[2327]: AVC avc: denied { perfmon } for pid=2327 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:29.363000 audit[2327]: AVC avc: denied { perfmon } for pid=2327 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:29.363000 audit[2327]: AVC avc: denied { perfmon } for pid=2327 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:29.363000 audit[2327]: AVC avc: denied { perfmon } for pid=2327 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:29.363000 audit[2327]: AVC avc: denied { bpf } for pid=2327 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:29.363000 audit[2327]: AVC avc: denied { bpf } for pid=2327 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:29.363000 audit: BPF prog-id=96 op=LOAD Jul 10 00:23:29.363000 audit[2327]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=ffffd0012828 a2=94 a3=5 items=0 ppid=2166 pid=2327 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:23:29.363000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 10 00:23:29.363000 audit: BPF prog-id=96 op=UNLOAD Jul 10 00:23:29.363000 audit[2327]: AVC avc: denied { perfmon } for pid=2327 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:29.363000 audit[2327]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=0 a1=ffffd0012930 a2=50 a3=0 items=0 ppid=2166 pid=2327 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:23:29.363000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 10 00:23:29.363000 audit[2327]: AVC avc: denied { bpf } for pid=2327 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:29.363000 audit[2327]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=16 a1=ffffd0012a78 a2=4 a3=3 items=0 ppid=2166 pid=2327 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:23:29.363000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 10 00:23:29.363000 audit[2327]: AVC avc: denied { bpf } for pid=2327 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:29.363000 audit[2327]: AVC avc: denied { bpf } for pid=2327 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:29.363000 audit[2327]: AVC avc: denied { perfmon } for pid=2327 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:29.363000 audit[2327]: AVC avc: denied { bpf } for pid=2327 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:29.363000 audit[2327]: AVC avc: denied { perfmon } for pid=2327 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:29.363000 audit[2327]: AVC avc: denied { perfmon } for pid=2327 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:29.363000 audit[2327]: AVC avc: denied { perfmon } for pid=2327 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:29.363000 audit[2327]: AVC avc: denied { perfmon } for pid=2327 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:29.363000 audit[2327]: AVC avc: denied { perfmon } for pid=2327 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:29.363000 audit[2327]: AVC avc: denied { bpf } for pid=2327 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:29.363000 audit[2327]: AVC avc: denied { confidentiality } for pid=2327 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:23:29.363000 audit[2327]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=ffffd0012a58 a2=94 a3=6 items=0 ppid=2166 pid=2327 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:23:29.363000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 10 00:23:29.364000 audit[2327]: AVC avc: denied { bpf } for pid=2327 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:29.364000 audit[2327]: AVC avc: denied { bpf } for pid=2327 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:29.364000 audit[2327]: AVC avc: denied { perfmon } for pid=2327 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:29.364000 audit[2327]: AVC avc: denied { bpf } for pid=2327 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:29.364000 audit[2327]: AVC avc: denied { perfmon } for pid=2327 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:29.364000 audit[2327]: AVC avc: denied { perfmon } for pid=2327 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:29.364000 audit[2327]: AVC avc: denied { perfmon } for pid=2327 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:29.364000 audit[2327]: AVC avc: denied { perfmon } for pid=2327 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:29.364000 audit[2327]: AVC avc: denied { perfmon } for pid=2327 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:29.364000 audit[2327]: AVC avc: denied { bpf } for pid=2327 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:29.364000 audit[2327]: AVC avc: denied { confidentiality } for pid=2327 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:23:29.364000 audit[2327]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=ffffd0012228 a2=94 a3=83 items=0 ppid=2166 pid=2327 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:23:29.364000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 10 00:23:29.364000 audit[2327]: AVC avc: denied { bpf } for pid=2327 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:29.364000 audit[2327]: AVC avc: denied { bpf } for pid=2327 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:29.364000 audit[2327]: AVC avc: denied { perfmon } for pid=2327 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:29.364000 audit[2327]: AVC avc: denied { bpf } for pid=2327 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:29.364000 audit[2327]: AVC avc: denied { perfmon } for pid=2327 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:29.364000 audit[2327]: AVC avc: denied { perfmon } for pid=2327 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:29.364000 audit[2327]: AVC avc: denied { perfmon } for pid=2327 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:29.364000 audit[2327]: AVC avc: denied { perfmon } for pid=2327 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:29.364000 audit[2327]: AVC avc: denied { perfmon } for pid=2327 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:29.364000 audit[2327]: AVC avc: denied { bpf } for pid=2327 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:29.364000 audit[2327]: AVC avc: denied { confidentiality } for pid=2327 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:23:29.364000 audit[2327]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=ffffd0012228 a2=94 a3=83 items=0 ppid=2166 pid=2327 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:23:29.364000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 10 00:23:29.364000 audit[2327]: AVC avc: denied { bpf } for pid=2327 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:29.364000 audit[2327]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffd0013c68 a2=10 a3=ffffd0013d58 items=0 ppid=2166 pid=2327 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:23:29.364000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 10 00:23:29.364000 audit[2327]: AVC avc: denied { bpf } for pid=2327 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:29.364000 audit[2327]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffd0013b28 a2=10 a3=ffffd0013c18 items=0 ppid=2166 pid=2327 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:23:29.364000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 10 00:23:29.364000 audit[2327]: AVC avc: denied { bpf } for pid=2327 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:29.364000 audit[2327]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffd0013a98 a2=10 a3=ffffd0013c18 items=0 ppid=2166 pid=2327 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:23:29.364000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 10 00:23:29.364000 audit[2327]: AVC avc: denied { bpf } for pid=2327 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:29.364000 audit[2327]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffd0013a98 a2=10 a3=ffffd0013c18 items=0 ppid=2166 pid=2327 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:23:29.364000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 10 00:23:29.375000 audit: BPF prog-id=91 op=UNLOAD Jul 10 00:23:29.410000 audit[2354]: NETFILTER_CFG table=mangle:75 family=2 entries=16 op=nft_register_chain pid=2354 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 10 00:23:29.410000 audit[2354]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6868 a0=3 a1=ffffc440b570 a2=0 a3=ffffb00bcfa8 items=0 ppid=2166 pid=2354 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:23:29.410000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 10 00:23:29.422000 audit[2358]: NETFILTER_CFG table=nat:76 family=2 entries=15 op=nft_register_chain pid=2358 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 10 00:23:29.422000 audit[2358]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5084 a0=3 a1=fffff5200000 a2=0 a3=ffff8d5ccfa8 items=0 ppid=2166 pid=2358 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:23:29.422000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 10 00:23:29.423000 audit[2356]: NETFILTER_CFG table=filter:77 family=2 entries=39 op=nft_register_chain pid=2356 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 10 00:23:29.423000 audit[2356]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=18968 a0=3 a1=fffff7163b00 a2=0 a3=ffffbcc0ffa8 items=0 ppid=2166 pid=2356 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:23:29.423000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 10 00:23:29.424000 audit[2355]: NETFILTER_CFG table=raw:78 family=2 entries=21 op=nft_register_chain pid=2355 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 10 00:23:29.424000 audit[2355]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=8452 a0=3 a1=fffffdfec960 a2=0 a3=ffffab3c0fa8 items=0 ppid=2166 pid=2355 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:23:29.424000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 10 00:23:29.778943 kubelet[1455]: E0710 00:23:29.778823 1455 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 00:23:30.283572 systemd-networkd[1044]: vxlan.calico: Gained IPv6LL Jul 10 00:23:30.780054 kubelet[1455]: E0710 00:23:30.779927 1455 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 00:23:31.781054 kubelet[1455]: E0710 00:23:31.781005 1455 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 00:23:32.781408 kubelet[1455]: E0710 00:23:32.781361 1455 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 00:23:33.762612 kubelet[1455]: E0710 00:23:33.762564 1455 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 00:23:33.782202 kubelet[1455]: E0710 00:23:33.782164 1455 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 00:23:34.629000 audit[2377]: NETFILTER_CFG table=filter:79 family=2 entries=11 op=nft_register_rule pid=2377 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 10 00:23:34.630666 kernel: kauditd_printk_skb: 547 callbacks suppressed Jul 10 00:23:34.630710 kernel: audit: type=1325 audit(1752107014.629:652): table=filter:79 family=2 entries=11 op=nft_register_rule pid=2377 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 10 00:23:34.629000 audit[2377]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3760 a0=3 a1=fffff5e94c50 a2=0 a3=1 items=0 ppid=1727 pid=2377 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:23:34.634764 kernel: audit: type=1300 audit(1752107014.629:652): arch=c00000b7 syscall=211 success=yes exit=3760 a0=3 a1=fffff5e94c50 a2=0 a3=1 items=0 ppid=1727 pid=2377 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:23:34.634807 kernel: audit: type=1327 audit(1752107014.629:652): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 10 00:23:34.629000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 10 00:23:34.639000 audit[2377]: NETFILTER_CFG table=nat:80 family=2 entries=29 op=nft_register_chain pid=2377 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 10 00:23:34.639000 audit[2377]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=10116 a0=3 a1=fffff5e94c50 a2=0 a3=1 items=0 ppid=1727 pid=2377 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:23:34.644207 kernel: audit: type=1325 audit(1752107014.639:653): table=nat:80 family=2 entries=29 op=nft_register_chain pid=2377 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 10 00:23:34.644252 kernel: audit: type=1300 audit(1752107014.639:653): arch=c00000b7 syscall=211 success=yes exit=10116 a0=3 a1=fffff5e94c50 a2=0 a3=1 items=0 ppid=1727 pid=2377 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:23:34.644273 kernel: audit: type=1327 audit(1752107014.639:653): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 10 00:23:34.639000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 10 00:23:34.783221 kubelet[1455]: E0710 00:23:34.783177 1455 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 00:23:35.783980 kubelet[1455]: E0710 00:23:35.783937 1455 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 00:23:35.933474 env[1217]: time="2025-07-10T00:23:35.933302766Z" level=info msg="StopPodSandbox for \"a51783dab29ad920b20e34ef28c0c75aefc64baa7bab9c11fab04269d865df96\"" Jul 10 00:23:35.981180 kubelet[1455]: I0710 00:23:35.980827 1455 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-node-h4vml" podStartSLOduration=10.490027326 podStartE2EDuration="21.980750406s" podCreationTimestamp="2025-07-10 00:23:14 +0000 UTC" firstStartedPulling="2025-07-10 00:23:15.854405206 +0000 UTC m=+2.647400681" lastFinishedPulling="2025-07-10 00:23:27.345128286 +0000 UTC m=+14.138123761" observedRunningTime="2025-07-10 00:23:28.007329326 +0000 UTC m=+14.800324801" watchObservedRunningTime="2025-07-10 00:23:35.980750406 +0000 UTC m=+22.773745881" Jul 10 00:23:36.051163 env[1217]: 2025-07-10 00:23:35.980 [INFO][2389] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="a51783dab29ad920b20e34ef28c0c75aefc64baa7bab9c11fab04269d865df96" Jul 10 00:23:36.051163 env[1217]: 2025-07-10 00:23:35.980 [INFO][2389] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="a51783dab29ad920b20e34ef28c0c75aefc64baa7bab9c11fab04269d865df96" iface="eth0" netns="/var/run/netns/cni-0c2856c5-b14b-cd3f-3580-aeb011221f79" Jul 10 00:23:36.051163 env[1217]: 2025-07-10 00:23:35.980 [INFO][2389] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="a51783dab29ad920b20e34ef28c0c75aefc64baa7bab9c11fab04269d865df96" iface="eth0" netns="/var/run/netns/cni-0c2856c5-b14b-cd3f-3580-aeb011221f79" Jul 10 00:23:36.051163 env[1217]: 2025-07-10 00:23:35.981 [INFO][2389] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="a51783dab29ad920b20e34ef28c0c75aefc64baa7bab9c11fab04269d865df96" iface="eth0" netns="/var/run/netns/cni-0c2856c5-b14b-cd3f-3580-aeb011221f79" Jul 10 00:23:36.051163 env[1217]: 2025-07-10 00:23:35.981 [INFO][2389] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="a51783dab29ad920b20e34ef28c0c75aefc64baa7bab9c11fab04269d865df96" Jul 10 00:23:36.051163 env[1217]: 2025-07-10 00:23:35.981 [INFO][2389] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="a51783dab29ad920b20e34ef28c0c75aefc64baa7bab9c11fab04269d865df96" Jul 10 00:23:36.051163 env[1217]: 2025-07-10 00:23:36.036 [INFO][2397] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="a51783dab29ad920b20e34ef28c0c75aefc64baa7bab9c11fab04269d865df96" HandleID="k8s-pod-network.a51783dab29ad920b20e34ef28c0c75aefc64baa7bab9c11fab04269d865df96" Workload="10.0.0.22-k8s-csi--node--driver--bb72p-eth0" Jul 10 00:23:36.051163 env[1217]: 2025-07-10 00:23:36.036 [INFO][2397] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Jul 10 00:23:36.051163 env[1217]: 2025-07-10 00:23:36.036 [INFO][2397] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Jul 10 00:23:36.051163 env[1217]: 2025-07-10 00:23:36.046 [WARNING][2397] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="a51783dab29ad920b20e34ef28c0c75aefc64baa7bab9c11fab04269d865df96" HandleID="k8s-pod-network.a51783dab29ad920b20e34ef28c0c75aefc64baa7bab9c11fab04269d865df96" Workload="10.0.0.22-k8s-csi--node--driver--bb72p-eth0" Jul 10 00:23:36.051163 env[1217]: 2025-07-10 00:23:36.046 [INFO][2397] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="a51783dab29ad920b20e34ef28c0c75aefc64baa7bab9c11fab04269d865df96" HandleID="k8s-pod-network.a51783dab29ad920b20e34ef28c0c75aefc64baa7bab9c11fab04269d865df96" Workload="10.0.0.22-k8s-csi--node--driver--bb72p-eth0" Jul 10 00:23:36.051163 env[1217]: 2025-07-10 00:23:36.047 [INFO][2397] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Jul 10 00:23:36.051163 env[1217]: 2025-07-10 00:23:36.049 [INFO][2389] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="a51783dab29ad920b20e34ef28c0c75aefc64baa7bab9c11fab04269d865df96" Jul 10 00:23:36.052647 systemd[1]: run-netns-cni\x2d0c2856c5\x2db14b\x2dcd3f\x2d3580\x2daeb011221f79.mount: Deactivated successfully. Jul 10 00:23:36.053333 env[1217]: time="2025-07-10T00:23:36.053273086Z" level=info msg="TearDown network for sandbox \"a51783dab29ad920b20e34ef28c0c75aefc64baa7bab9c11fab04269d865df96\" successfully" Jul 10 00:23:36.053333 env[1217]: time="2025-07-10T00:23:36.053316046Z" level=info msg="StopPodSandbox for \"a51783dab29ad920b20e34ef28c0c75aefc64baa7bab9c11fab04269d865df96\" returns successfully" Jul 10 00:23:36.054029 env[1217]: time="2025-07-10T00:23:36.053997326Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-bb72p,Uid:ac010dd4-3be4-467e-b5c3-63ff2bfb42e5,Namespace:calico-system,Attempt:1,}" Jul 10 00:23:36.169906 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Jul 10 00:23:36.170015 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): caliabdd5180bc2: link becomes ready Jul 10 00:23:36.169707 systemd-networkd[1044]: caliabdd5180bc2: Link UP Jul 10 00:23:36.171680 systemd-networkd[1044]: caliabdd5180bc2: Gained carrier Jul 10 00:23:36.184587 env[1217]: 2025-07-10 00:23:36.102 [INFO][2407] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.0.0.22-k8s-csi--node--driver--bb72p-eth0 csi-node-driver- calico-system ac010dd4-3be4-467e-b5c3-63ff2bfb42e5 1185 0 2025-07-10 00:23:14 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:8967bcb6f k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:csi-node-driver] map[] [] [] []} {k8s 10.0.0.22 csi-node-driver-bb72p eth0 csi-node-driver [] [] [kns.calico-system ksa.calico-system.csi-node-driver] caliabdd5180bc2 [] [] }} ContainerID="bedff499c7bed01af9a0d9b78850a7c8d41d8309a44e7f5f98d73f80fd446b92" Namespace="calico-system" Pod="csi-node-driver-bb72p" WorkloadEndpoint="10.0.0.22-k8s-csi--node--driver--bb72p-" Jul 10 00:23:36.184587 env[1217]: 2025-07-10 00:23:36.102 [INFO][2407] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="bedff499c7bed01af9a0d9b78850a7c8d41d8309a44e7f5f98d73f80fd446b92" Namespace="calico-system" Pod="csi-node-driver-bb72p" WorkloadEndpoint="10.0.0.22-k8s-csi--node--driver--bb72p-eth0" Jul 10 00:23:36.184587 env[1217]: 2025-07-10 00:23:36.130 [INFO][2421] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="bedff499c7bed01af9a0d9b78850a7c8d41d8309a44e7f5f98d73f80fd446b92" HandleID="k8s-pod-network.bedff499c7bed01af9a0d9b78850a7c8d41d8309a44e7f5f98d73f80fd446b92" Workload="10.0.0.22-k8s-csi--node--driver--bb72p-eth0" Jul 10 00:23:36.184587 env[1217]: 2025-07-10 00:23:36.131 [INFO][2421] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="bedff499c7bed01af9a0d9b78850a7c8d41d8309a44e7f5f98d73f80fd446b92" HandleID="k8s-pod-network.bedff499c7bed01af9a0d9b78850a7c8d41d8309a44e7f5f98d73f80fd446b92" Workload="10.0.0.22-k8s-csi--node--driver--bb72p-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x4000323620), Attrs:map[string]string{"namespace":"calico-system", "node":"10.0.0.22", "pod":"csi-node-driver-bb72p", "timestamp":"2025-07-10 00:23:36.130947286 +0000 UTC"}, Hostname:"10.0.0.22", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Jul 10 00:23:36.184587 env[1217]: 2025-07-10 00:23:36.131 [INFO][2421] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Jul 10 00:23:36.184587 env[1217]: 2025-07-10 00:23:36.131 [INFO][2421] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Jul 10 00:23:36.184587 env[1217]: 2025-07-10 00:23:36.131 [INFO][2421] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.0.0.22' Jul 10 00:23:36.184587 env[1217]: 2025-07-10 00:23:36.140 [INFO][2421] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.bedff499c7bed01af9a0d9b78850a7c8d41d8309a44e7f5f98d73f80fd446b92" host="10.0.0.22" Jul 10 00:23:36.184587 env[1217]: 2025-07-10 00:23:36.145 [INFO][2421] ipam/ipam.go 394: Looking up existing affinities for host host="10.0.0.22" Jul 10 00:23:36.184587 env[1217]: 2025-07-10 00:23:36.150 [INFO][2421] ipam/ipam.go 511: Trying affinity for 192.168.12.192/26 host="10.0.0.22" Jul 10 00:23:36.184587 env[1217]: 2025-07-10 00:23:36.151 [INFO][2421] ipam/ipam.go 158: Attempting to load block cidr=192.168.12.192/26 host="10.0.0.22" Jul 10 00:23:36.184587 env[1217]: 2025-07-10 00:23:36.154 [INFO][2421] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.12.192/26 host="10.0.0.22" Jul 10 00:23:36.184587 env[1217]: 2025-07-10 00:23:36.154 [INFO][2421] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.12.192/26 handle="k8s-pod-network.bedff499c7bed01af9a0d9b78850a7c8d41d8309a44e7f5f98d73f80fd446b92" host="10.0.0.22" Jul 10 00:23:36.184587 env[1217]: 2025-07-10 00:23:36.155 [INFO][2421] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.bedff499c7bed01af9a0d9b78850a7c8d41d8309a44e7f5f98d73f80fd446b92 Jul 10 00:23:36.184587 env[1217]: 2025-07-10 00:23:36.159 [INFO][2421] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.12.192/26 handle="k8s-pod-network.bedff499c7bed01af9a0d9b78850a7c8d41d8309a44e7f5f98d73f80fd446b92" host="10.0.0.22" Jul 10 00:23:36.184587 env[1217]: 2025-07-10 00:23:36.164 [INFO][2421] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.12.193/26] block=192.168.12.192/26 handle="k8s-pod-network.bedff499c7bed01af9a0d9b78850a7c8d41d8309a44e7f5f98d73f80fd446b92" host="10.0.0.22" Jul 10 00:23:36.184587 env[1217]: 2025-07-10 00:23:36.164 [INFO][2421] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.12.193/26] handle="k8s-pod-network.bedff499c7bed01af9a0d9b78850a7c8d41d8309a44e7f5f98d73f80fd446b92" host="10.0.0.22" Jul 10 00:23:36.184587 env[1217]: 2025-07-10 00:23:36.164 [INFO][2421] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Jul 10 00:23:36.184587 env[1217]: 2025-07-10 00:23:36.164 [INFO][2421] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.12.193/26] IPv6=[] ContainerID="bedff499c7bed01af9a0d9b78850a7c8d41d8309a44e7f5f98d73f80fd446b92" HandleID="k8s-pod-network.bedff499c7bed01af9a0d9b78850a7c8d41d8309a44e7f5f98d73f80fd446b92" Workload="10.0.0.22-k8s-csi--node--driver--bb72p-eth0" Jul 10 00:23:36.186734 env[1217]: 2025-07-10 00:23:36.166 [INFO][2407] cni-plugin/k8s.go 418: Populated endpoint ContainerID="bedff499c7bed01af9a0d9b78850a7c8d41d8309a44e7f5f98d73f80fd446b92" Namespace="calico-system" Pod="csi-node-driver-bb72p" WorkloadEndpoint="10.0.0.22-k8s-csi--node--driver--bb72p-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.22-k8s-csi--node--driver--bb72p-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"ac010dd4-3be4-467e-b5c3-63ff2bfb42e5", ResourceVersion:"1185", Generation:0, CreationTimestamp:time.Date(2025, time.July, 10, 0, 23, 14, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"8967bcb6f", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.22", ContainerID:"", Pod:"csi-node-driver-bb72p", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.12.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"caliabdd5180bc2", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Jul 10 00:23:36.186734 env[1217]: 2025-07-10 00:23:36.166 [INFO][2407] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.12.193/32] ContainerID="bedff499c7bed01af9a0d9b78850a7c8d41d8309a44e7f5f98d73f80fd446b92" Namespace="calico-system" Pod="csi-node-driver-bb72p" WorkloadEndpoint="10.0.0.22-k8s-csi--node--driver--bb72p-eth0" Jul 10 00:23:36.186734 env[1217]: 2025-07-10 00:23:36.166 [INFO][2407] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to caliabdd5180bc2 ContainerID="bedff499c7bed01af9a0d9b78850a7c8d41d8309a44e7f5f98d73f80fd446b92" Namespace="calico-system" Pod="csi-node-driver-bb72p" WorkloadEndpoint="10.0.0.22-k8s-csi--node--driver--bb72p-eth0" Jul 10 00:23:36.186734 env[1217]: 2025-07-10 00:23:36.170 [INFO][2407] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="bedff499c7bed01af9a0d9b78850a7c8d41d8309a44e7f5f98d73f80fd446b92" Namespace="calico-system" Pod="csi-node-driver-bb72p" WorkloadEndpoint="10.0.0.22-k8s-csi--node--driver--bb72p-eth0" Jul 10 00:23:36.186734 env[1217]: 2025-07-10 00:23:36.170 [INFO][2407] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="bedff499c7bed01af9a0d9b78850a7c8d41d8309a44e7f5f98d73f80fd446b92" Namespace="calico-system" Pod="csi-node-driver-bb72p" WorkloadEndpoint="10.0.0.22-k8s-csi--node--driver--bb72p-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.22-k8s-csi--node--driver--bb72p-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"ac010dd4-3be4-467e-b5c3-63ff2bfb42e5", ResourceVersion:"1185", Generation:0, CreationTimestamp:time.Date(2025, time.July, 10, 0, 23, 14, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"8967bcb6f", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.22", ContainerID:"bedff499c7bed01af9a0d9b78850a7c8d41d8309a44e7f5f98d73f80fd446b92", Pod:"csi-node-driver-bb72p", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.12.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"caliabdd5180bc2", MAC:"06:56:83:2f:60:58", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Jul 10 00:23:36.186734 env[1217]: 2025-07-10 00:23:36.182 [INFO][2407] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="bedff499c7bed01af9a0d9b78850a7c8d41d8309a44e7f5f98d73f80fd446b92" Namespace="calico-system" Pod="csi-node-driver-bb72p" WorkloadEndpoint="10.0.0.22-k8s-csi--node--driver--bb72p-eth0" Jul 10 00:23:36.195741 env[1217]: time="2025-07-10T00:23:36.195664086Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 10 00:23:36.195942 env[1217]: time="2025-07-10T00:23:36.195704086Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 10 00:23:36.195942 env[1217]: time="2025-07-10T00:23:36.195721086Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 10 00:23:36.196209 env[1217]: time="2025-07-10T00:23:36.196174046Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/bedff499c7bed01af9a0d9b78850a7c8d41d8309a44e7f5f98d73f80fd446b92 pid=2448 runtime=io.containerd.runc.v2 Jul 10 00:23:36.208845 systemd[1]: Started cri-containerd-bedff499c7bed01af9a0d9b78850a7c8d41d8309a44e7f5f98d73f80fd446b92.scope. Jul 10 00:23:36.200000 audit[2443]: NETFILTER_CFG table=filter:81 family=2 entries=38 op=nft_register_chain pid=2443 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 10 00:23:36.200000 audit[2443]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=21364 a0=3 a1=fffff1bfddd0 a2=0 a3=ffff9723dfa8 items=0 ppid=2166 pid=2443 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:23:36.231135 kernel: audit: type=1325 audit(1752107016.200:654): table=filter:81 family=2 entries=38 op=nft_register_chain pid=2443 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 10 00:23:36.231182 kernel: audit: type=1300 audit(1752107016.200:654): arch=c00000b7 syscall=211 success=yes exit=21364 a0=3 a1=fffff1bfddd0 a2=0 a3=ffff9723dfa8 items=0 ppid=2166 pid=2443 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:23:36.231200 kernel: audit: type=1327 audit(1752107016.200:654): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 10 00:23:36.200000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 10 00:23:36.243000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:36.243000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:36.243000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:36.243000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:36.243000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:36.243000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:36.245470 kernel: audit: type=1400 audit(1752107016.243:655): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:36.243000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:36.243000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:36.243000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:36.244000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:36.244000 audit: BPF prog-id=97 op=LOAD Jul 10 00:23:36.245000 audit[2458]: AVC avc: denied { bpf } for pid=2458 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:36.245000 audit[2458]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=2448 pid=2458 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:23:36.245000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6265646666343939633762656430316166396130643962373838353061 Jul 10 00:23:36.245000 audit[2458]: AVC avc: denied { perfmon } for pid=2458 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:36.245000 audit[2458]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2448 pid=2458 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:23:36.245000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6265646666343939633762656430316166396130643962373838353061 Jul 10 00:23:36.245000 audit[2458]: AVC avc: denied { bpf } for pid=2458 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:36.245000 audit[2458]: AVC avc: denied { bpf } for pid=2458 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:36.245000 audit[2458]: AVC avc: denied { bpf } for pid=2458 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:36.245000 audit[2458]: AVC avc: denied { perfmon } for pid=2458 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:36.245000 audit[2458]: AVC avc: denied { perfmon } for pid=2458 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:36.245000 audit[2458]: AVC avc: denied { perfmon } for pid=2458 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:36.245000 audit[2458]: AVC avc: denied { perfmon } for pid=2458 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:36.245000 audit[2458]: AVC avc: denied { perfmon } for pid=2458 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:36.245000 audit[2458]: AVC avc: denied { bpf } for pid=2458 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:36.245000 audit[2458]: AVC avc: denied { bpf } for pid=2458 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:36.245000 audit: BPF prog-id=98 op=LOAD Jul 10 00:23:36.245000 audit[2458]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=2448 pid=2458 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:23:36.245000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6265646666343939633762656430316166396130643962373838353061 Jul 10 00:23:36.245000 audit[2458]: AVC avc: denied { bpf } for pid=2458 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:36.245000 audit[2458]: AVC avc: denied { bpf } for pid=2458 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:36.245000 audit[2458]: AVC avc: denied { perfmon } for pid=2458 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:36.245000 audit[2458]: AVC avc: denied { perfmon } for pid=2458 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:36.245000 audit[2458]: AVC avc: denied { perfmon } for pid=2458 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:36.245000 audit[2458]: AVC avc: denied { perfmon } for pid=2458 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:36.245000 audit[2458]: AVC avc: denied { perfmon } for pid=2458 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:36.245000 audit[2458]: AVC avc: denied { bpf } for pid=2458 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:36.245000 audit[2458]: AVC avc: denied { bpf } for pid=2458 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:36.245000 audit: BPF prog-id=99 op=LOAD Jul 10 00:23:36.245000 audit[2458]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=2448 pid=2458 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:23:36.245000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6265646666343939633762656430316166396130643962373838353061 Jul 10 00:23:36.245000 audit: BPF prog-id=99 op=UNLOAD Jul 10 00:23:36.245000 audit: BPF prog-id=98 op=UNLOAD Jul 10 00:23:36.245000 audit[2458]: AVC avc: denied { bpf } for pid=2458 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:36.245000 audit[2458]: AVC avc: denied { bpf } for pid=2458 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:36.245000 audit[2458]: AVC avc: denied { bpf } for pid=2458 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:36.245000 audit[2458]: AVC avc: denied { perfmon } for pid=2458 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:36.245000 audit[2458]: AVC avc: denied { perfmon } for pid=2458 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:36.245000 audit[2458]: AVC avc: denied { perfmon } for pid=2458 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:36.245000 audit[2458]: AVC avc: denied { perfmon } for pid=2458 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:36.245000 audit[2458]: AVC avc: denied { perfmon } for pid=2458 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:36.245000 audit[2458]: AVC avc: denied { bpf } for pid=2458 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:36.245000 audit[2458]: AVC avc: denied { bpf } for pid=2458 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:36.245000 audit: BPF prog-id=100 op=LOAD Jul 10 00:23:36.245000 audit[2458]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=2448 pid=2458 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:23:36.245000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6265646666343939633762656430316166396130643962373838353061 Jul 10 00:23:36.246665 systemd-resolved[1157]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Jul 10 00:23:36.257142 env[1217]: time="2025-07-10T00:23:36.257098926Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-bb72p,Uid:ac010dd4-3be4-467e-b5c3-63ff2bfb42e5,Namespace:calico-system,Attempt:1,} returns sandbox id \"bedff499c7bed01af9a0d9b78850a7c8d41d8309a44e7f5f98d73f80fd446b92\"" Jul 10 00:23:36.258902 env[1217]: time="2025-07-10T00:23:36.258862046Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.30.2\"" Jul 10 00:23:36.784938 kubelet[1455]: E0710 00:23:36.784893 1455 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 00:23:37.385878 env[1217]: time="2025-07-10T00:23:37.385827286Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.30.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 10 00:23:37.387530 env[1217]: time="2025-07-10T00:23:37.387491526Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:14ecfabbdbebd1f5a36708f8b11a95a43baddd6a935d7d78c89a9c333849fcd2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 10 00:23:37.388927 env[1217]: time="2025-07-10T00:23:37.388899246Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.30.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 10 00:23:37.390085 env[1217]: time="2025-07-10T00:23:37.390053246Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:e570128aa8067a2f06b96d3cc98afa2e0a4b9790b435ee36ca051c8e72aeb8d0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 10 00:23:37.390531 env[1217]: time="2025-07-10T00:23:37.390501486Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.30.2\" returns image reference \"sha256:14ecfabbdbebd1f5a36708f8b11a95a43baddd6a935d7d78c89a9c333849fcd2\"" Jul 10 00:23:37.392669 env[1217]: time="2025-07-10T00:23:37.392630926Z" level=info msg="CreateContainer within sandbox \"bedff499c7bed01af9a0d9b78850a7c8d41d8309a44e7f5f98d73f80fd446b92\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" Jul 10 00:23:37.403433 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2918636325.mount: Deactivated successfully. Jul 10 00:23:37.407202 env[1217]: time="2025-07-10T00:23:37.407137566Z" level=info msg="CreateContainer within sandbox \"bedff499c7bed01af9a0d9b78850a7c8d41d8309a44e7f5f98d73f80fd446b92\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"a1c386ae474781df8b2d43899b2198e6b49439a588fc2c456b2f2e343abf1a48\"" Jul 10 00:23:37.407696 env[1217]: time="2025-07-10T00:23:37.407660246Z" level=info msg="StartContainer for \"a1c386ae474781df8b2d43899b2198e6b49439a588fc2c456b2f2e343abf1a48\"" Jul 10 00:23:37.418000 audit[2496]: NETFILTER_CFG table=filter:82 family=2 entries=10 op=nft_register_rule pid=2496 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 10 00:23:37.418000 audit[2496]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3760 a0=3 a1=ffffd64a16a0 a2=0 a3=1 items=0 ppid=1727 pid=2496 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:23:37.418000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 10 00:23:37.426000 audit[2496]: NETFILTER_CFG table=nat:83 family=2 entries=36 op=nft_register_chain pid=2496 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 10 00:23:37.426000 audit[2496]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=12004 a0=3 a1=ffffd64a16a0 a2=0 a3=1 items=0 ppid=1727 pid=2496 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:23:37.426000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 10 00:23:37.426819 systemd[1]: Started cri-containerd-a1c386ae474781df8b2d43899b2198e6b49439a588fc2c456b2f2e343abf1a48.scope. Jul 10 00:23:37.450000 audit[2495]: AVC avc: denied { perfmon } for pid=2495 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:37.450000 audit[2495]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001155a0 a2=3c a3=0 items=0 ppid=2448 pid=2495 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:23:37.450000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6131633338366165343734373831646638623264343338393962323139 Jul 10 00:23:37.450000 audit[2495]: AVC avc: denied { bpf } for pid=2495 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:37.450000 audit[2495]: AVC avc: denied { bpf } for pid=2495 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:37.450000 audit[2495]: AVC avc: denied { bpf } for pid=2495 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:37.450000 audit[2495]: AVC avc: denied { perfmon } for pid=2495 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:37.450000 audit[2495]: AVC avc: denied { perfmon } for pid=2495 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:37.450000 audit[2495]: AVC avc: denied { perfmon } for pid=2495 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:37.450000 audit[2495]: AVC avc: denied { perfmon } for pid=2495 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:37.450000 audit[2495]: AVC avc: denied { perfmon } for pid=2495 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:37.450000 audit[2495]: AVC avc: denied { bpf } for pid=2495 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:37.450000 audit[2495]: AVC avc: denied { bpf } for pid=2495 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:37.450000 audit: BPF prog-id=101 op=LOAD Jul 10 00:23:37.450000 audit[2495]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001158e0 a2=78 a3=0 items=0 ppid=2448 pid=2495 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:23:37.450000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6131633338366165343734373831646638623264343338393962323139 Jul 10 00:23:37.450000 audit[2495]: AVC avc: denied { bpf } for pid=2495 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:37.450000 audit[2495]: AVC avc: denied { bpf } for pid=2495 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:37.450000 audit[2495]: AVC avc: denied { perfmon } for pid=2495 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:37.450000 audit[2495]: AVC avc: denied { perfmon } for pid=2495 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:37.450000 audit[2495]: AVC avc: denied { perfmon } for pid=2495 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:37.450000 audit[2495]: AVC avc: denied { perfmon } for pid=2495 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:37.450000 audit[2495]: AVC avc: denied { perfmon } for pid=2495 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:37.450000 audit[2495]: AVC avc: denied { bpf } for pid=2495 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:37.450000 audit[2495]: AVC avc: denied { bpf } for pid=2495 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:37.450000 audit: BPF prog-id=102 op=LOAD Jul 10 00:23:37.450000 audit[2495]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000115670 a2=78 a3=0 items=0 ppid=2448 pid=2495 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:23:37.450000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6131633338366165343734373831646638623264343338393962323139 Jul 10 00:23:37.450000 audit: BPF prog-id=102 op=UNLOAD Jul 10 00:23:37.450000 audit: BPF prog-id=101 op=UNLOAD Jul 10 00:23:37.450000 audit[2495]: AVC avc: denied { bpf } for pid=2495 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:37.450000 audit[2495]: AVC avc: denied { bpf } for pid=2495 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:37.450000 audit[2495]: AVC avc: denied { bpf } for pid=2495 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:37.450000 audit[2495]: AVC avc: denied { perfmon } for pid=2495 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:37.450000 audit[2495]: AVC avc: denied { perfmon } for pid=2495 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:37.450000 audit[2495]: AVC avc: denied { perfmon } for pid=2495 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:37.450000 audit[2495]: AVC avc: denied { perfmon } for pid=2495 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:37.450000 audit[2495]: AVC avc: denied { perfmon } for pid=2495 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:37.450000 audit[2495]: AVC avc: denied { bpf } for pid=2495 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:37.450000 audit[2495]: AVC avc: denied { bpf } for pid=2495 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:37.450000 audit: BPF prog-id=103 op=LOAD Jul 10 00:23:37.450000 audit[2495]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000115b40 a2=78 a3=0 items=0 ppid=2448 pid=2495 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:23:37.450000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6131633338366165343734373831646638623264343338393962323139 Jul 10 00:23:37.465734 env[1217]: time="2025-07-10T00:23:37.465684326Z" level=info msg="StartContainer for \"a1c386ae474781df8b2d43899b2198e6b49439a588fc2c456b2f2e343abf1a48\" returns successfully" Jul 10 00:23:37.467216 env[1217]: time="2025-07-10T00:23:37.467183166Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.2\"" Jul 10 00:23:37.785771 kubelet[1455]: E0710 00:23:37.785652 1455 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 00:23:38.027661 systemd-networkd[1044]: caliabdd5180bc2: Gained IPv6LL Jul 10 00:23:38.574990 env[1217]: time="2025-07-10T00:23:38.574947446Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.30.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 10 00:23:38.576400 env[1217]: time="2025-07-10T00:23:38.576354486Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:664ed31fb4687b0de23d6e6e116bc87b236790d7355871d3237c54452e02e27c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 10 00:23:38.578040 env[1217]: time="2025-07-10T00:23:38.578010286Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.30.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 10 00:23:38.579200 env[1217]: time="2025-07-10T00:23:38.579165646Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:8fec2de12dfa51bae89d941938a07af2598eb8bfcab55d0dded1d9c193d7b99f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 10 00:23:38.579764 env[1217]: time="2025-07-10T00:23:38.579730566Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.2\" returns image reference \"sha256:664ed31fb4687b0de23d6e6e116bc87b236790d7355871d3237c54452e02e27c\"" Jul 10 00:23:38.582584 env[1217]: time="2025-07-10T00:23:38.582554366Z" level=info msg="CreateContainer within sandbox \"bedff499c7bed01af9a0d9b78850a7c8d41d8309a44e7f5f98d73f80fd446b92\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" Jul 10 00:23:38.592246 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3009560470.mount: Deactivated successfully. Jul 10 00:23:38.593625 env[1217]: time="2025-07-10T00:23:38.593575326Z" level=info msg="CreateContainer within sandbox \"bedff499c7bed01af9a0d9b78850a7c8d41d8309a44e7f5f98d73f80fd446b92\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"b36b78a40f7566c7e8c462a5a216592d987c3a084d266bc180e42c131e75f02f\"" Jul 10 00:23:38.594136 env[1217]: time="2025-07-10T00:23:38.594110566Z" level=info msg="StartContainer for \"b36b78a40f7566c7e8c462a5a216592d987c3a084d266bc180e42c131e75f02f\"" Jul 10 00:23:38.612849 systemd[1]: run-containerd-runc-k8s.io-b36b78a40f7566c7e8c462a5a216592d987c3a084d266bc180e42c131e75f02f-runc.U5qumY.mount: Deactivated successfully. Jul 10 00:23:38.614754 systemd[1]: Started cri-containerd-b36b78a40f7566c7e8c462a5a216592d987c3a084d266bc180e42c131e75f02f.scope. Jul 10 00:23:38.638000 audit[2532]: AVC avc: denied { perfmon } for pid=2532 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:38.638000 audit[2532]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2448 pid=2532 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:23:38.638000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6233366237386134306637353636633765386334363261356132313635 Jul 10 00:23:38.638000 audit[2532]: AVC avc: denied { bpf } for pid=2532 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:38.638000 audit[2532]: AVC avc: denied { bpf } for pid=2532 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:38.638000 audit[2532]: AVC avc: denied { bpf } for pid=2532 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:38.638000 audit[2532]: AVC avc: denied { perfmon } for pid=2532 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:38.638000 audit[2532]: AVC avc: denied { perfmon } for pid=2532 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:38.638000 audit[2532]: AVC avc: denied { perfmon } for pid=2532 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:38.638000 audit[2532]: AVC avc: denied { perfmon } for pid=2532 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:38.638000 audit[2532]: AVC avc: denied { perfmon } for pid=2532 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:38.638000 audit[2532]: AVC avc: denied { bpf } for pid=2532 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:38.638000 audit[2532]: AVC avc: denied { bpf } for pid=2532 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:38.638000 audit: BPF prog-id=104 op=LOAD Jul 10 00:23:38.638000 audit[2532]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2448 pid=2532 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:23:38.638000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6233366237386134306637353636633765386334363261356132313635 Jul 10 00:23:38.639000 audit[2532]: AVC avc: denied { bpf } for pid=2532 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:38.639000 audit[2532]: AVC avc: denied { bpf } for pid=2532 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:38.639000 audit[2532]: AVC avc: denied { perfmon } for pid=2532 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:38.639000 audit[2532]: AVC avc: denied { perfmon } for pid=2532 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:38.639000 audit[2532]: AVC avc: denied { perfmon } for pid=2532 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:38.639000 audit[2532]: AVC avc: denied { perfmon } for pid=2532 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:38.639000 audit[2532]: AVC avc: denied { perfmon } for pid=2532 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:38.639000 audit[2532]: AVC avc: denied { bpf } for pid=2532 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:38.639000 audit[2532]: AVC avc: denied { bpf } for pid=2532 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:38.639000 audit: BPF prog-id=105 op=LOAD Jul 10 00:23:38.639000 audit[2532]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2448 pid=2532 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:23:38.639000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6233366237386134306637353636633765386334363261356132313635 Jul 10 00:23:38.639000 audit: BPF prog-id=105 op=UNLOAD Jul 10 00:23:38.639000 audit: BPF prog-id=104 op=UNLOAD Jul 10 00:23:38.639000 audit[2532]: AVC avc: denied { bpf } for pid=2532 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:38.639000 audit[2532]: AVC avc: denied { bpf } for pid=2532 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:38.639000 audit[2532]: AVC avc: denied { bpf } for pid=2532 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:38.639000 audit[2532]: AVC avc: denied { perfmon } for pid=2532 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:38.639000 audit[2532]: AVC avc: denied { perfmon } for pid=2532 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:38.639000 audit[2532]: AVC avc: denied { perfmon } for pid=2532 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:38.639000 audit[2532]: AVC avc: denied { perfmon } for pid=2532 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:38.639000 audit[2532]: AVC avc: denied { perfmon } for pid=2532 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:38.639000 audit[2532]: AVC avc: denied { bpf } for pid=2532 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:38.639000 audit[2532]: AVC avc: denied { bpf } for pid=2532 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:38.639000 audit: BPF prog-id=106 op=LOAD Jul 10 00:23:38.639000 audit[2532]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2448 pid=2532 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:23:38.639000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6233366237386134306637353636633765386334363261356132313635 Jul 10 00:23:38.654698 env[1217]: time="2025-07-10T00:23:38.654642646Z" level=info msg="StartContainer for \"b36b78a40f7566c7e8c462a5a216592d987c3a084d266bc180e42c131e75f02f\" returns successfully" Jul 10 00:23:38.785984 kubelet[1455]: E0710 00:23:38.785943 1455 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 00:23:38.924490 kubelet[1455]: I0710 00:23:38.924381 1455 csi_plugin.go:100] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 Jul 10 00:23:38.924490 kubelet[1455]: I0710 00:23:38.924427 1455 csi_plugin.go:113] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock Jul 10 00:23:39.014914 kubelet[1455]: I0710 00:23:39.014851 1455 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/csi-node-driver-bb72p" podStartSLOduration=22.692261646 podStartE2EDuration="25.014834446s" podCreationTimestamp="2025-07-10 00:23:14 +0000 UTC" firstStartedPulling="2025-07-10 00:23:36.258259366 +0000 UTC m=+23.051254841" lastFinishedPulling="2025-07-10 00:23:38.580832166 +0000 UTC m=+25.373827641" observedRunningTime="2025-07-10 00:23:39.014758646 +0000 UTC m=+25.807754121" watchObservedRunningTime="2025-07-10 00:23:39.014834446 +0000 UTC m=+25.807829921" Jul 10 00:23:39.786970 kubelet[1455]: E0710 00:23:39.786932 1455 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 00:23:40.787536 kubelet[1455]: E0710 00:23:40.787499 1455 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 00:23:41.788937 kubelet[1455]: E0710 00:23:41.788892 1455 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 00:23:41.933874 env[1217]: time="2025-07-10T00:23:41.933829908Z" level=info msg="StopPodSandbox for \"0cbe2f9f5f2c0b67bcd2e1b08b365ad6cb1003f64d7574dfbbff4edb1560d63b\"" Jul 10 00:23:42.032310 env[1217]: 2025-07-10 00:23:41.981 [INFO][2582] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="0cbe2f9f5f2c0b67bcd2e1b08b365ad6cb1003f64d7574dfbbff4edb1560d63b" Jul 10 00:23:42.032310 env[1217]: 2025-07-10 00:23:41.981 [INFO][2582] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="0cbe2f9f5f2c0b67bcd2e1b08b365ad6cb1003f64d7574dfbbff4edb1560d63b" iface="eth0" netns="/var/run/netns/cni-fab628d3-1e84-6e1e-744f-3bcb702596a4" Jul 10 00:23:42.032310 env[1217]: 2025-07-10 00:23:41.981 [INFO][2582] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="0cbe2f9f5f2c0b67bcd2e1b08b365ad6cb1003f64d7574dfbbff4edb1560d63b" iface="eth0" netns="/var/run/netns/cni-fab628d3-1e84-6e1e-744f-3bcb702596a4" Jul 10 00:23:42.032310 env[1217]: 2025-07-10 00:23:41.981 [INFO][2582] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="0cbe2f9f5f2c0b67bcd2e1b08b365ad6cb1003f64d7574dfbbff4edb1560d63b" iface="eth0" netns="/var/run/netns/cni-fab628d3-1e84-6e1e-744f-3bcb702596a4" Jul 10 00:23:42.032310 env[1217]: 2025-07-10 00:23:41.982 [INFO][2582] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="0cbe2f9f5f2c0b67bcd2e1b08b365ad6cb1003f64d7574dfbbff4edb1560d63b" Jul 10 00:23:42.032310 env[1217]: 2025-07-10 00:23:41.982 [INFO][2582] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="0cbe2f9f5f2c0b67bcd2e1b08b365ad6cb1003f64d7574dfbbff4edb1560d63b" Jul 10 00:23:42.032310 env[1217]: 2025-07-10 00:23:42.017 [INFO][2590] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="0cbe2f9f5f2c0b67bcd2e1b08b365ad6cb1003f64d7574dfbbff4edb1560d63b" HandleID="k8s-pod-network.0cbe2f9f5f2c0b67bcd2e1b08b365ad6cb1003f64d7574dfbbff4edb1560d63b" Workload="10.0.0.22-k8s-nginx--deployment--7fcdb87857--mwnr8-eth0" Jul 10 00:23:42.032310 env[1217]: 2025-07-10 00:23:42.017 [INFO][2590] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Jul 10 00:23:42.032310 env[1217]: 2025-07-10 00:23:42.017 [INFO][2590] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Jul 10 00:23:42.032310 env[1217]: 2025-07-10 00:23:42.027 [WARNING][2590] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="0cbe2f9f5f2c0b67bcd2e1b08b365ad6cb1003f64d7574dfbbff4edb1560d63b" HandleID="k8s-pod-network.0cbe2f9f5f2c0b67bcd2e1b08b365ad6cb1003f64d7574dfbbff4edb1560d63b" Workload="10.0.0.22-k8s-nginx--deployment--7fcdb87857--mwnr8-eth0" Jul 10 00:23:42.032310 env[1217]: 2025-07-10 00:23:42.027 [INFO][2590] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="0cbe2f9f5f2c0b67bcd2e1b08b365ad6cb1003f64d7574dfbbff4edb1560d63b" HandleID="k8s-pod-network.0cbe2f9f5f2c0b67bcd2e1b08b365ad6cb1003f64d7574dfbbff4edb1560d63b" Workload="10.0.0.22-k8s-nginx--deployment--7fcdb87857--mwnr8-eth0" Jul 10 00:23:42.032310 env[1217]: 2025-07-10 00:23:42.029 [INFO][2590] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Jul 10 00:23:42.032310 env[1217]: 2025-07-10 00:23:42.030 [INFO][2582] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="0cbe2f9f5f2c0b67bcd2e1b08b365ad6cb1003f64d7574dfbbff4edb1560d63b" Jul 10 00:23:42.034031 env[1217]: time="2025-07-10T00:23:42.033988642Z" level=info msg="TearDown network for sandbox \"0cbe2f9f5f2c0b67bcd2e1b08b365ad6cb1003f64d7574dfbbff4edb1560d63b\" successfully" Jul 10 00:23:42.034127 env[1217]: time="2025-07-10T00:23:42.034108122Z" level=info msg="StopPodSandbox for \"0cbe2f9f5f2c0b67bcd2e1b08b365ad6cb1003f64d7574dfbbff4edb1560d63b\" returns successfully" Jul 10 00:23:42.034800 env[1217]: time="2025-07-10T00:23:42.034765197Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-7fcdb87857-mwnr8,Uid:42e01b8f-2f0e-4715-840b-6f672d61337a,Namespace:default,Attempt:1,}" Jul 10 00:23:42.035315 systemd[1]: run-netns-cni\x2dfab628d3\x2d1e84\x2d6e1e\x2d744f\x2d3bcb702596a4.mount: Deactivated successfully. Jul 10 00:23:42.141055 systemd-networkd[1044]: calic503c782dfe: Link UP Jul 10 00:23:42.142951 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Jul 10 00:23:42.143075 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calic503c782dfe: link becomes ready Jul 10 00:23:42.143200 systemd-networkd[1044]: calic503c782dfe: Gained carrier Jul 10 00:23:42.152955 env[1217]: 2025-07-10 00:23:42.082 [INFO][2598] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.0.0.22-k8s-nginx--deployment--7fcdb87857--mwnr8-eth0 nginx-deployment-7fcdb87857- default 42e01b8f-2f0e-4715-840b-6f672d61337a 1228 0 2025-07-10 00:23:25 +0000 UTC map[app:nginx pod-template-hash:7fcdb87857 projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 10.0.0.22 nginx-deployment-7fcdb87857-mwnr8 eth0 default [] [] [kns.default ksa.default.default] calic503c782dfe [] [] }} ContainerID="2266d28496abe77dc3cbd5e7e2a396ae9d5365746858ee76dfb777d1bb0350a0" Namespace="default" Pod="nginx-deployment-7fcdb87857-mwnr8" WorkloadEndpoint="10.0.0.22-k8s-nginx--deployment--7fcdb87857--mwnr8-" Jul 10 00:23:42.152955 env[1217]: 2025-07-10 00:23:42.082 [INFO][2598] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="2266d28496abe77dc3cbd5e7e2a396ae9d5365746858ee76dfb777d1bb0350a0" Namespace="default" Pod="nginx-deployment-7fcdb87857-mwnr8" WorkloadEndpoint="10.0.0.22-k8s-nginx--deployment--7fcdb87857--mwnr8-eth0" Jul 10 00:23:42.152955 env[1217]: 2025-07-10 00:23:42.103 [INFO][2613] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="2266d28496abe77dc3cbd5e7e2a396ae9d5365746858ee76dfb777d1bb0350a0" HandleID="k8s-pod-network.2266d28496abe77dc3cbd5e7e2a396ae9d5365746858ee76dfb777d1bb0350a0" Workload="10.0.0.22-k8s-nginx--deployment--7fcdb87857--mwnr8-eth0" Jul 10 00:23:42.152955 env[1217]: 2025-07-10 00:23:42.103 [INFO][2613] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="2266d28496abe77dc3cbd5e7e2a396ae9d5365746858ee76dfb777d1bb0350a0" HandleID="k8s-pod-network.2266d28496abe77dc3cbd5e7e2a396ae9d5365746858ee76dfb777d1bb0350a0" Workload="10.0.0.22-k8s-nginx--deployment--7fcdb87857--mwnr8-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x400004d6a0), Attrs:map[string]string{"namespace":"default", "node":"10.0.0.22", "pod":"nginx-deployment-7fcdb87857-mwnr8", "timestamp":"2025-07-10 00:23:42.10355164 +0000 UTC"}, Hostname:"10.0.0.22", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Jul 10 00:23:42.152955 env[1217]: 2025-07-10 00:23:42.103 [INFO][2613] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Jul 10 00:23:42.152955 env[1217]: 2025-07-10 00:23:42.103 [INFO][2613] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Jul 10 00:23:42.152955 env[1217]: 2025-07-10 00:23:42.103 [INFO][2613] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.0.0.22' Jul 10 00:23:42.152955 env[1217]: 2025-07-10 00:23:42.113 [INFO][2613] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.2266d28496abe77dc3cbd5e7e2a396ae9d5365746858ee76dfb777d1bb0350a0" host="10.0.0.22" Jul 10 00:23:42.152955 env[1217]: 2025-07-10 00:23:42.117 [INFO][2613] ipam/ipam.go 394: Looking up existing affinities for host host="10.0.0.22" Jul 10 00:23:42.152955 env[1217]: 2025-07-10 00:23:42.121 [INFO][2613] ipam/ipam.go 511: Trying affinity for 192.168.12.192/26 host="10.0.0.22" Jul 10 00:23:42.152955 env[1217]: 2025-07-10 00:23:42.123 [INFO][2613] ipam/ipam.go 158: Attempting to load block cidr=192.168.12.192/26 host="10.0.0.22" Jul 10 00:23:42.152955 env[1217]: 2025-07-10 00:23:42.126 [INFO][2613] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.12.192/26 host="10.0.0.22" Jul 10 00:23:42.152955 env[1217]: 2025-07-10 00:23:42.126 [INFO][2613] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.12.192/26 handle="k8s-pod-network.2266d28496abe77dc3cbd5e7e2a396ae9d5365746858ee76dfb777d1bb0350a0" host="10.0.0.22" Jul 10 00:23:42.152955 env[1217]: 2025-07-10 00:23:42.128 [INFO][2613] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.2266d28496abe77dc3cbd5e7e2a396ae9d5365746858ee76dfb777d1bb0350a0 Jul 10 00:23:42.152955 env[1217]: 2025-07-10 00:23:42.132 [INFO][2613] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.12.192/26 handle="k8s-pod-network.2266d28496abe77dc3cbd5e7e2a396ae9d5365746858ee76dfb777d1bb0350a0" host="10.0.0.22" Jul 10 00:23:42.152955 env[1217]: 2025-07-10 00:23:42.137 [INFO][2613] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.12.194/26] block=192.168.12.192/26 handle="k8s-pod-network.2266d28496abe77dc3cbd5e7e2a396ae9d5365746858ee76dfb777d1bb0350a0" host="10.0.0.22" Jul 10 00:23:42.152955 env[1217]: 2025-07-10 00:23:42.137 [INFO][2613] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.12.194/26] handle="k8s-pod-network.2266d28496abe77dc3cbd5e7e2a396ae9d5365746858ee76dfb777d1bb0350a0" host="10.0.0.22" Jul 10 00:23:42.152955 env[1217]: 2025-07-10 00:23:42.137 [INFO][2613] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Jul 10 00:23:42.152955 env[1217]: 2025-07-10 00:23:42.137 [INFO][2613] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.12.194/26] IPv6=[] ContainerID="2266d28496abe77dc3cbd5e7e2a396ae9d5365746858ee76dfb777d1bb0350a0" HandleID="k8s-pod-network.2266d28496abe77dc3cbd5e7e2a396ae9d5365746858ee76dfb777d1bb0350a0" Workload="10.0.0.22-k8s-nginx--deployment--7fcdb87857--mwnr8-eth0" Jul 10 00:23:42.153623 env[1217]: 2025-07-10 00:23:42.139 [INFO][2598] cni-plugin/k8s.go 418: Populated endpoint ContainerID="2266d28496abe77dc3cbd5e7e2a396ae9d5365746858ee76dfb777d1bb0350a0" Namespace="default" Pod="nginx-deployment-7fcdb87857-mwnr8" WorkloadEndpoint="10.0.0.22-k8s-nginx--deployment--7fcdb87857--mwnr8-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.22-k8s-nginx--deployment--7fcdb87857--mwnr8-eth0", GenerateName:"nginx-deployment-7fcdb87857-", Namespace:"default", SelfLink:"", UID:"42e01b8f-2f0e-4715-840b-6f672d61337a", ResourceVersion:"1228", Generation:0, CreationTimestamp:time.Date(2025, time.July, 10, 0, 23, 25, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"7fcdb87857", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.22", ContainerID:"", Pod:"nginx-deployment-7fcdb87857-mwnr8", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.12.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"calic503c782dfe", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Jul 10 00:23:42.153623 env[1217]: 2025-07-10 00:23:42.139 [INFO][2598] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.12.194/32] ContainerID="2266d28496abe77dc3cbd5e7e2a396ae9d5365746858ee76dfb777d1bb0350a0" Namespace="default" Pod="nginx-deployment-7fcdb87857-mwnr8" WorkloadEndpoint="10.0.0.22-k8s-nginx--deployment--7fcdb87857--mwnr8-eth0" Jul 10 00:23:42.153623 env[1217]: 2025-07-10 00:23:42.139 [INFO][2598] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calic503c782dfe ContainerID="2266d28496abe77dc3cbd5e7e2a396ae9d5365746858ee76dfb777d1bb0350a0" Namespace="default" Pod="nginx-deployment-7fcdb87857-mwnr8" WorkloadEndpoint="10.0.0.22-k8s-nginx--deployment--7fcdb87857--mwnr8-eth0" Jul 10 00:23:42.153623 env[1217]: 2025-07-10 00:23:42.143 [INFO][2598] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="2266d28496abe77dc3cbd5e7e2a396ae9d5365746858ee76dfb777d1bb0350a0" Namespace="default" Pod="nginx-deployment-7fcdb87857-mwnr8" WorkloadEndpoint="10.0.0.22-k8s-nginx--deployment--7fcdb87857--mwnr8-eth0" Jul 10 00:23:42.153623 env[1217]: 2025-07-10 00:23:42.143 [INFO][2598] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="2266d28496abe77dc3cbd5e7e2a396ae9d5365746858ee76dfb777d1bb0350a0" Namespace="default" Pod="nginx-deployment-7fcdb87857-mwnr8" WorkloadEndpoint="10.0.0.22-k8s-nginx--deployment--7fcdb87857--mwnr8-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.22-k8s-nginx--deployment--7fcdb87857--mwnr8-eth0", GenerateName:"nginx-deployment-7fcdb87857-", Namespace:"default", SelfLink:"", UID:"42e01b8f-2f0e-4715-840b-6f672d61337a", ResourceVersion:"1228", Generation:0, CreationTimestamp:time.Date(2025, time.July, 10, 0, 23, 25, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"7fcdb87857", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.22", ContainerID:"2266d28496abe77dc3cbd5e7e2a396ae9d5365746858ee76dfb777d1bb0350a0", Pod:"nginx-deployment-7fcdb87857-mwnr8", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.12.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"calic503c782dfe", MAC:"b2:e0:db:bf:ae:43", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Jul 10 00:23:42.153623 env[1217]: 2025-07-10 00:23:42.151 [INFO][2598] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="2266d28496abe77dc3cbd5e7e2a396ae9d5365746858ee76dfb777d1bb0350a0" Namespace="default" Pod="nginx-deployment-7fcdb87857-mwnr8" WorkloadEndpoint="10.0.0.22-k8s-nginx--deployment--7fcdb87857--mwnr8-eth0" Jul 10 00:23:42.167322 kernel: kauditd_printk_skb: 148 callbacks suppressed Jul 10 00:23:42.167421 kernel: audit: type=1325 audit(1752107022.160:687): table=filter:84 family=2 entries=42 op=nft_register_chain pid=2634 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 10 00:23:42.167442 kernel: audit: type=1300 audit(1752107022.160:687): arch=c00000b7 syscall=211 success=yes exit=22512 a0=3 a1=ffffe4ffa550 a2=0 a3=ffffb95b4fa8 items=0 ppid=2166 pid=2634 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:23:42.167472 kernel: audit: type=1327 audit(1752107022.160:687): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 10 00:23:42.160000 audit[2634]: NETFILTER_CFG table=filter:84 family=2 entries=42 op=nft_register_chain pid=2634 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 10 00:23:42.160000 audit[2634]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=22512 a0=3 a1=ffffe4ffa550 a2=0 a3=ffffb95b4fa8 items=0 ppid=2166 pid=2634 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:23:42.160000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 10 00:23:42.167640 env[1217]: time="2025-07-10T00:23:42.163402299Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 10 00:23:42.167640 env[1217]: time="2025-07-10T00:23:42.163442578Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 10 00:23:42.167640 env[1217]: time="2025-07-10T00:23:42.163488018Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 10 00:23:42.167640 env[1217]: time="2025-07-10T00:23:42.163670777Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/2266d28496abe77dc3cbd5e7e2a396ae9d5365746858ee76dfb777d1bb0350a0 pid=2638 runtime=io.containerd.runc.v2 Jul 10 00:23:42.178881 systemd[1]: Started cri-containerd-2266d28496abe77dc3cbd5e7e2a396ae9d5365746858ee76dfb777d1bb0350a0.scope. Jul 10 00:23:42.209000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:42.209000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:42.213128 kernel: audit: type=1400 audit(1752107022.209:688): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:42.213191 kernel: audit: type=1400 audit(1752107022.209:689): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:42.213209 kernel: audit: type=1400 audit(1752107022.209:690): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:42.209000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:42.209000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:42.216580 kernel: audit: type=1400 audit(1752107022.209:691): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:42.216623 kernel: audit: type=1400 audit(1752107022.209:692): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:42.209000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:42.218345 kernel: audit: type=1400 audit(1752107022.209:693): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:42.209000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:42.209000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:42.220264 systemd-resolved[1157]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Jul 10 00:23:42.221847 kernel: audit: type=1400 audit(1752107022.209:694): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:42.209000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:42.209000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:42.210000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:42.210000 audit: BPF prog-id=107 op=LOAD Jul 10 00:23:42.211000 audit[2649]: AVC avc: denied { bpf } for pid=2649 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:42.211000 audit[2649]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=2638 pid=2649 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:23:42.211000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3232363664323834393661626537376463336362643565376532613339 Jul 10 00:23:42.211000 audit[2649]: AVC avc: denied { perfmon } for pid=2649 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:42.211000 audit[2649]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2638 pid=2649 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:23:42.211000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3232363664323834393661626537376463336362643565376532613339 Jul 10 00:23:42.211000 audit[2649]: AVC avc: denied { bpf } for pid=2649 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:42.211000 audit[2649]: AVC avc: denied { bpf } for pid=2649 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:42.211000 audit[2649]: AVC avc: denied { bpf } for pid=2649 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:42.211000 audit[2649]: AVC avc: denied { perfmon } for pid=2649 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:42.211000 audit[2649]: AVC avc: denied { perfmon } for pid=2649 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:42.211000 audit[2649]: AVC avc: denied { perfmon } for pid=2649 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:42.211000 audit[2649]: AVC avc: denied { perfmon } for pid=2649 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:42.211000 audit[2649]: AVC avc: denied { perfmon } for pid=2649 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:42.211000 audit[2649]: AVC avc: denied { bpf } for pid=2649 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:42.211000 audit[2649]: AVC avc: denied { bpf } for pid=2649 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:42.211000 audit: BPF prog-id=108 op=LOAD Jul 10 00:23:42.211000 audit[2649]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2638 pid=2649 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:23:42.211000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3232363664323834393661626537376463336362643565376532613339 Jul 10 00:23:42.212000 audit[2649]: AVC avc: denied { bpf } for pid=2649 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:42.212000 audit[2649]: AVC avc: denied { bpf } for pid=2649 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:42.212000 audit[2649]: AVC avc: denied { perfmon } for pid=2649 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:42.212000 audit[2649]: AVC avc: denied { perfmon } for pid=2649 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:42.212000 audit[2649]: AVC avc: denied { perfmon } for pid=2649 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:42.212000 audit[2649]: AVC avc: denied { perfmon } for pid=2649 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:42.212000 audit[2649]: AVC avc: denied { perfmon } for pid=2649 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:42.212000 audit[2649]: AVC avc: denied { bpf } for pid=2649 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:42.212000 audit[2649]: AVC avc: denied { bpf } for pid=2649 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:42.212000 audit: BPF prog-id=109 op=LOAD Jul 10 00:23:42.212000 audit[2649]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2638 pid=2649 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:23:42.212000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3232363664323834393661626537376463336362643565376532613339 Jul 10 00:23:42.214000 audit: BPF prog-id=109 op=UNLOAD Jul 10 00:23:42.214000 audit: BPF prog-id=108 op=UNLOAD Jul 10 00:23:42.214000 audit[2649]: AVC avc: denied { bpf } for pid=2649 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:42.214000 audit[2649]: AVC avc: denied { bpf } for pid=2649 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:42.214000 audit[2649]: AVC avc: denied { bpf } for pid=2649 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:42.214000 audit[2649]: AVC avc: denied { perfmon } for pid=2649 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:42.214000 audit[2649]: AVC avc: denied { perfmon } for pid=2649 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:42.214000 audit[2649]: AVC avc: denied { perfmon } for pid=2649 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:42.214000 audit[2649]: AVC avc: denied { perfmon } for pid=2649 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:42.214000 audit[2649]: AVC avc: denied { perfmon } for pid=2649 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:42.214000 audit[2649]: AVC avc: denied { bpf } for pid=2649 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:42.214000 audit[2649]: AVC avc: denied { bpf } for pid=2649 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:42.214000 audit: BPF prog-id=110 op=LOAD Jul 10 00:23:42.214000 audit[2649]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2638 pid=2649 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:23:42.214000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3232363664323834393661626537376463336362643565376532613339 Jul 10 00:23:42.236750 env[1217]: time="2025-07-10T00:23:42.236697592Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-7fcdb87857-mwnr8,Uid:42e01b8f-2f0e-4715-840b-6f672d61337a,Namespace:default,Attempt:1,} returns sandbox id \"2266d28496abe77dc3cbd5e7e2a396ae9d5365746858ee76dfb777d1bb0350a0\"" Jul 10 00:23:42.238597 env[1217]: time="2025-07-10T00:23:42.238559980Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" Jul 10 00:23:42.789469 kubelet[1455]: E0710 00:23:42.789406 1455 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 00:23:43.277272 systemd-networkd[1044]: calic503c782dfe: Gained IPv6LL Jul 10 00:23:43.789985 kubelet[1455]: E0710 00:23:43.789949 1455 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 00:23:44.197426 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount587375870.mount: Deactivated successfully. Jul 10 00:23:44.790972 kubelet[1455]: E0710 00:23:44.790931 1455 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 00:23:45.508008 env[1217]: time="2025-07-10T00:23:45.507945268Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 10 00:23:45.509592 env[1217]: time="2025-07-10T00:23:45.509079102Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:cd8b38a4e22587134e82fff3512a99b84799274d989a1ec20f58c7f8c89b8511,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 10 00:23:45.510897 env[1217]: time="2025-07-10T00:23:45.510863052Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 10 00:23:45.512651 env[1217]: time="2025-07-10T00:23:45.512607603Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx@sha256:30bb68e656e0665bce700e67d2756f68bdca3345fa1099a32bfdb8febcf621cd,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 10 00:23:45.513493 env[1217]: time="2025-07-10T00:23:45.513453639Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:cd8b38a4e22587134e82fff3512a99b84799274d989a1ec20f58c7f8c89b8511\"" Jul 10 00:23:45.515926 env[1217]: time="2025-07-10T00:23:45.515887546Z" level=info msg="CreateContainer within sandbox \"2266d28496abe77dc3cbd5e7e2a396ae9d5365746858ee76dfb777d1bb0350a0\" for container &ContainerMetadata{Name:nginx,Attempt:0,}" Jul 10 00:23:45.525390 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2251671382.mount: Deactivated successfully. Jul 10 00:23:45.529595 env[1217]: time="2025-07-10T00:23:45.529524875Z" level=info msg="CreateContainer within sandbox \"2266d28496abe77dc3cbd5e7e2a396ae9d5365746858ee76dfb777d1bb0350a0\" for &ContainerMetadata{Name:nginx,Attempt:0,} returns container id \"23ec6202122ff2c7f511d210bd71ffa3d58acf705738f42873a146ea0337bd96\"" Jul 10 00:23:45.530272 env[1217]: time="2025-07-10T00:23:45.530242711Z" level=info msg="StartContainer for \"23ec6202122ff2c7f511d210bd71ffa3d58acf705738f42873a146ea0337bd96\"" Jul 10 00:23:45.549575 systemd[1]: Started cri-containerd-23ec6202122ff2c7f511d210bd71ffa3d58acf705738f42873a146ea0337bd96.scope. Jul 10 00:23:45.600000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:45.600000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:45.600000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:45.600000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:45.600000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:45.600000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:45.600000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:45.600000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:45.600000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:45.601000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:45.601000 audit: BPF prog-id=111 op=LOAD Jul 10 00:23:45.601000 audit[2682]: AVC avc: denied { bpf } for pid=2682 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:45.601000 audit[2682]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=2638 pid=2682 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:23:45.601000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3233656336323032313232666632633766353131643231306264373166 Jul 10 00:23:45.601000 audit[2682]: AVC avc: denied { perfmon } for pid=2682 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:45.601000 audit[2682]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2638 pid=2682 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:23:45.601000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3233656336323032313232666632633766353131643231306264373166 Jul 10 00:23:45.601000 audit[2682]: AVC avc: denied { bpf } for pid=2682 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:45.601000 audit[2682]: AVC avc: denied { bpf } for pid=2682 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:45.601000 audit[2682]: AVC avc: denied { bpf } for pid=2682 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:45.601000 audit[2682]: AVC avc: denied { perfmon } for pid=2682 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:45.601000 audit[2682]: AVC avc: denied { perfmon } for pid=2682 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:45.601000 audit[2682]: AVC avc: denied { perfmon } for pid=2682 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:45.601000 audit[2682]: AVC avc: denied { perfmon } for pid=2682 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:45.601000 audit[2682]: AVC avc: denied { perfmon } for pid=2682 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:45.601000 audit[2682]: AVC avc: denied { bpf } for pid=2682 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:45.601000 audit[2682]: AVC avc: denied { bpf } for pid=2682 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:45.601000 audit: BPF prog-id=112 op=LOAD Jul 10 00:23:45.601000 audit[2682]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=2638 pid=2682 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:23:45.601000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3233656336323032313232666632633766353131643231306264373166 Jul 10 00:23:45.601000 audit[2682]: AVC avc: denied { bpf } for pid=2682 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:45.601000 audit[2682]: AVC avc: denied { bpf } for pid=2682 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:45.601000 audit[2682]: AVC avc: denied { perfmon } for pid=2682 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:45.601000 audit[2682]: AVC avc: denied { perfmon } for pid=2682 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:45.601000 audit[2682]: AVC avc: denied { perfmon } for pid=2682 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:45.601000 audit[2682]: AVC avc: denied { perfmon } for pid=2682 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:45.601000 audit[2682]: AVC avc: denied { perfmon } for pid=2682 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:45.601000 audit[2682]: AVC avc: denied { bpf } for pid=2682 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:45.601000 audit[2682]: AVC avc: denied { bpf } for pid=2682 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:45.601000 audit: BPF prog-id=113 op=LOAD Jul 10 00:23:45.601000 audit[2682]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=2638 pid=2682 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:23:45.601000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3233656336323032313232666632633766353131643231306264373166 Jul 10 00:23:45.601000 audit: BPF prog-id=113 op=UNLOAD Jul 10 00:23:45.601000 audit: BPF prog-id=112 op=UNLOAD Jul 10 00:23:45.601000 audit[2682]: AVC avc: denied { bpf } for pid=2682 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:45.601000 audit[2682]: AVC avc: denied { bpf } for pid=2682 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:45.601000 audit[2682]: AVC avc: denied { bpf } for pid=2682 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:45.601000 audit[2682]: AVC avc: denied { perfmon } for pid=2682 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:45.601000 audit[2682]: AVC avc: denied { perfmon } for pid=2682 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:45.601000 audit[2682]: AVC avc: denied { perfmon } for pid=2682 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:45.601000 audit[2682]: AVC avc: denied { perfmon } for pid=2682 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:45.601000 audit[2682]: AVC avc: denied { perfmon } for pid=2682 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:45.601000 audit[2682]: AVC avc: denied { bpf } for pid=2682 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:45.601000 audit[2682]: AVC avc: denied { bpf } for pid=2682 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:45.601000 audit: BPF prog-id=114 op=LOAD Jul 10 00:23:45.601000 audit[2682]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=2638 pid=2682 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:23:45.601000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3233656336323032313232666632633766353131643231306264373166 Jul 10 00:23:45.626338 env[1217]: time="2025-07-10T00:23:45.624404817Z" level=info msg="StartContainer for \"23ec6202122ff2c7f511d210bd71ffa3d58acf705738f42873a146ea0337bd96\" returns successfully" Jul 10 00:23:45.791493 kubelet[1455]: E0710 00:23:45.791358 1455 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 00:23:46.064187 kubelet[1455]: I0710 00:23:46.063993 1455 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="default/nginx-deployment-7fcdb87857-mwnr8" podStartSLOduration=17.78772768 podStartE2EDuration="21.063977051s" podCreationTimestamp="2025-07-10 00:23:25 +0000 UTC" firstStartedPulling="2025-07-10 00:23:42.238076783 +0000 UTC m=+29.031072258" lastFinishedPulling="2025-07-10 00:23:45.514326154 +0000 UTC m=+32.307321629" observedRunningTime="2025-07-10 00:23:46.063833011 +0000 UTC m=+32.856828486" watchObservedRunningTime="2025-07-10 00:23:46.063977051 +0000 UTC m=+32.856972486" Jul 10 00:23:46.791654 kubelet[1455]: E0710 00:23:46.791597 1455 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 00:23:47.792776 kubelet[1455]: E0710 00:23:47.792718 1455 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 00:23:47.825000 audit[2734]: NETFILTER_CFG table=filter:85 family=2 entries=22 op=nft_register_rule pid=2734 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 10 00:23:47.829032 kernel: kauditd_printk_skb: 107 callbacks suppressed Jul 10 00:23:47.829167 kernel: audit: type=1325 audit(1752107027.825:724): table=filter:85 family=2 entries=22 op=nft_register_rule pid=2734 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 10 00:23:47.829213 kernel: audit: type=1300 audit(1752107027.825:724): arch=c00000b7 syscall=211 success=yes exit=12688 a0=3 a1=ffffd321adb0 a2=0 a3=1 items=0 ppid=1727 pid=2734 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:23:47.825000 audit[2734]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=12688 a0=3 a1=ffffd321adb0 a2=0 a3=1 items=0 ppid=1727 pid=2734 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:23:47.825000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 10 00:23:47.834612 kernel: audit: type=1327 audit(1752107027.825:724): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 10 00:23:47.839000 audit[2734]: NETFILTER_CFG table=nat:86 family=2 entries=24 op=nft_register_rule pid=2734 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 10 00:23:47.839000 audit[2734]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=7308 a0=3 a1=ffffd321adb0 a2=0 a3=1 items=0 ppid=1727 pid=2734 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:23:47.844749 kernel: audit: type=1325 audit(1752107027.839:725): table=nat:86 family=2 entries=24 op=nft_register_rule pid=2734 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 10 00:23:47.844824 kernel: audit: type=1300 audit(1752107027.839:725): arch=c00000b7 syscall=211 success=yes exit=7308 a0=3 a1=ffffd321adb0 a2=0 a3=1 items=0 ppid=1727 pid=2734 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:23:47.844864 kernel: audit: type=1327 audit(1752107027.839:725): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 10 00:23:47.839000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 10 00:23:47.854000 audit[2736]: NETFILTER_CFG table=filter:87 family=2 entries=34 op=nft_register_rule pid=2736 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 10 00:23:47.854000 audit[2736]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=12688 a0=3 a1=ffffecf0cf90 a2=0 a3=1 items=0 ppid=1727 pid=2736 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:23:47.860277 kernel: audit: type=1325 audit(1752107027.854:726): table=filter:87 family=2 entries=34 op=nft_register_rule pid=2736 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 10 00:23:47.860364 kernel: audit: type=1300 audit(1752107027.854:726): arch=c00000b7 syscall=211 success=yes exit=12688 a0=3 a1=ffffecf0cf90 a2=0 a3=1 items=0 ppid=1727 pid=2736 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:23:47.854000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 10 00:23:47.861902 kernel: audit: type=1327 audit(1752107027.854:726): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 10 00:23:47.872117 systemd[1]: Created slice kubepods-besteffort-pod0d5c45da_3f22_46f2_9477_80db51458b5f.slice. Jul 10 00:23:47.873000 audit[2736]: NETFILTER_CFG table=nat:88 family=2 entries=24 op=nft_register_rule pid=2736 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 10 00:23:47.873000 audit[2736]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=7308 a0=3 a1=ffffecf0cf90 a2=0 a3=1 items=0 ppid=1727 pid=2736 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:23:47.873000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 10 00:23:47.876534 kernel: audit: type=1325 audit(1752107027.873:727): table=nat:88 family=2 entries=24 op=nft_register_rule pid=2736 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 10 00:23:47.961253 kubelet[1455]: I0710 00:23:47.961203 1455 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-mlvfx\" (UniqueName: \"kubernetes.io/projected/0d5c45da-3f22-46f2-9477-80db51458b5f-kube-api-access-mlvfx\") pod \"nfs-server-provisioner-0\" (UID: \"0d5c45da-3f22-46f2-9477-80db51458b5f\") " pod="default/nfs-server-provisioner-0" Jul 10 00:23:47.961253 kubelet[1455]: I0710 00:23:47.961248 1455 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"data\" (UniqueName: \"kubernetes.io/empty-dir/0d5c45da-3f22-46f2-9477-80db51458b5f-data\") pod \"nfs-server-provisioner-0\" (UID: \"0d5c45da-3f22-46f2-9477-80db51458b5f\") " pod="default/nfs-server-provisioner-0" Jul 10 00:23:48.175951 env[1217]: time="2025-07-10T00:23:48.175511120Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:0d5c45da-3f22-46f2-9477-80db51458b5f,Namespace:default,Attempt:0,}" Jul 10 00:23:48.341947 systemd-networkd[1044]: cali60e51b789ff: Link UP Jul 10 00:23:48.344208 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Jul 10 00:23:48.344283 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali60e51b789ff: link becomes ready Jul 10 00:23:48.343619 systemd-networkd[1044]: cali60e51b789ff: Gained carrier Jul 10 00:23:48.359385 env[1217]: 2025-07-10 00:23:48.250 [INFO][2738] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.0.0.22-k8s-nfs--server--provisioner--0-eth0 nfs-server-provisioner- default 0d5c45da-3f22-46f2-9477-80db51458b5f 1270 0 2025-07-10 00:23:47 +0000 UTC map[app:nfs-server-provisioner apps.kubernetes.io/pod-index:0 chart:nfs-server-provisioner-1.8.0 controller-revision-hash:nfs-server-provisioner-d5cbb7f57 heritage:Helm projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:nfs-server-provisioner release:nfs-server-provisioner statefulset.kubernetes.io/pod-name:nfs-server-provisioner-0] map[] [] [] []} {k8s 10.0.0.22 nfs-server-provisioner-0 eth0 nfs-server-provisioner [] [] [kns.default ksa.default.nfs-server-provisioner] cali60e51b789ff [{nfs TCP 2049 0 } {nfs-udp UDP 2049 0 } {nlockmgr TCP 32803 0 } {nlockmgr-udp UDP 32803 0 } {mountd TCP 20048 0 } {mountd-udp UDP 20048 0 } {rquotad TCP 875 0 } {rquotad-udp UDP 875 0 } {rpcbind TCP 111 0 } {rpcbind-udp UDP 111 0 } {statd TCP 662 0 } {statd-udp UDP 662 0 }] [] }} ContainerID="6614484fa5c871325cf0fc6d0b2bad3ced211aa7f7ff6fe8f622f473789ccf56" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.22-k8s-nfs--server--provisioner--0-" Jul 10 00:23:48.359385 env[1217]: 2025-07-10 00:23:48.250 [INFO][2738] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="6614484fa5c871325cf0fc6d0b2bad3ced211aa7f7ff6fe8f622f473789ccf56" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.22-k8s-nfs--server--provisioner--0-eth0" Jul 10 00:23:48.359385 env[1217]: 2025-07-10 00:23:48.282 [INFO][2754] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="6614484fa5c871325cf0fc6d0b2bad3ced211aa7f7ff6fe8f622f473789ccf56" HandleID="k8s-pod-network.6614484fa5c871325cf0fc6d0b2bad3ced211aa7f7ff6fe8f622f473789ccf56" Workload="10.0.0.22-k8s-nfs--server--provisioner--0-eth0" Jul 10 00:23:48.359385 env[1217]: 2025-07-10 00:23:48.282 [INFO][2754] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="6614484fa5c871325cf0fc6d0b2bad3ced211aa7f7ff6fe8f622f473789ccf56" HandleID="k8s-pod-network.6614484fa5c871325cf0fc6d0b2bad3ced211aa7f7ff6fe8f622f473789ccf56" Workload="10.0.0.22-k8s-nfs--server--provisioner--0-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x400004c790), Attrs:map[string]string{"namespace":"default", "node":"10.0.0.22", "pod":"nfs-server-provisioner-0", "timestamp":"2025-07-10 00:23:48.282736177 +0000 UTC"}, Hostname:"10.0.0.22", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Jul 10 00:23:48.359385 env[1217]: 2025-07-10 00:23:48.282 [INFO][2754] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Jul 10 00:23:48.359385 env[1217]: 2025-07-10 00:23:48.283 [INFO][2754] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Jul 10 00:23:48.359385 env[1217]: 2025-07-10 00:23:48.283 [INFO][2754] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.0.0.22' Jul 10 00:23:48.359385 env[1217]: 2025-07-10 00:23:48.295 [INFO][2754] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.6614484fa5c871325cf0fc6d0b2bad3ced211aa7f7ff6fe8f622f473789ccf56" host="10.0.0.22" Jul 10 00:23:48.359385 env[1217]: 2025-07-10 00:23:48.303 [INFO][2754] ipam/ipam.go 394: Looking up existing affinities for host host="10.0.0.22" Jul 10 00:23:48.359385 env[1217]: 2025-07-10 00:23:48.313 [INFO][2754] ipam/ipam.go 511: Trying affinity for 192.168.12.192/26 host="10.0.0.22" Jul 10 00:23:48.359385 env[1217]: 2025-07-10 00:23:48.317 [INFO][2754] ipam/ipam.go 158: Attempting to load block cidr=192.168.12.192/26 host="10.0.0.22" Jul 10 00:23:48.359385 env[1217]: 2025-07-10 00:23:48.320 [INFO][2754] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.12.192/26 host="10.0.0.22" Jul 10 00:23:48.359385 env[1217]: 2025-07-10 00:23:48.320 [INFO][2754] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.12.192/26 handle="k8s-pod-network.6614484fa5c871325cf0fc6d0b2bad3ced211aa7f7ff6fe8f622f473789ccf56" host="10.0.0.22" Jul 10 00:23:48.359385 env[1217]: 2025-07-10 00:23:48.323 [INFO][2754] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.6614484fa5c871325cf0fc6d0b2bad3ced211aa7f7ff6fe8f622f473789ccf56 Jul 10 00:23:48.359385 env[1217]: 2025-07-10 00:23:48.330 [INFO][2754] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.12.192/26 handle="k8s-pod-network.6614484fa5c871325cf0fc6d0b2bad3ced211aa7f7ff6fe8f622f473789ccf56" host="10.0.0.22" Jul 10 00:23:48.359385 env[1217]: 2025-07-10 00:23:48.336 [INFO][2754] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.12.195/26] block=192.168.12.192/26 handle="k8s-pod-network.6614484fa5c871325cf0fc6d0b2bad3ced211aa7f7ff6fe8f622f473789ccf56" host="10.0.0.22" Jul 10 00:23:48.359385 env[1217]: 2025-07-10 00:23:48.336 [INFO][2754] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.12.195/26] handle="k8s-pod-network.6614484fa5c871325cf0fc6d0b2bad3ced211aa7f7ff6fe8f622f473789ccf56" host="10.0.0.22" Jul 10 00:23:48.359385 env[1217]: 2025-07-10 00:23:48.336 [INFO][2754] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Jul 10 00:23:48.359385 env[1217]: 2025-07-10 00:23:48.337 [INFO][2754] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.12.195/26] IPv6=[] ContainerID="6614484fa5c871325cf0fc6d0b2bad3ced211aa7f7ff6fe8f622f473789ccf56" HandleID="k8s-pod-network.6614484fa5c871325cf0fc6d0b2bad3ced211aa7f7ff6fe8f622f473789ccf56" Workload="10.0.0.22-k8s-nfs--server--provisioner--0-eth0" Jul 10 00:23:48.359995 env[1217]: 2025-07-10 00:23:48.338 [INFO][2738] cni-plugin/k8s.go 418: Populated endpoint ContainerID="6614484fa5c871325cf0fc6d0b2bad3ced211aa7f7ff6fe8f622f473789ccf56" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.22-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.22-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"0d5c45da-3f22-46f2-9477-80db51458b5f", ResourceVersion:"1270", Generation:0, CreationTimestamp:time.Date(2025, time.July, 10, 0, 23, 47, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "apps.kubernetes.io/pod-index":"0", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.22", ContainerID:"", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.12.195/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Jul 10 00:23:48.359995 env[1217]: 2025-07-10 00:23:48.338 [INFO][2738] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.12.195/32] ContainerID="6614484fa5c871325cf0fc6d0b2bad3ced211aa7f7ff6fe8f622f473789ccf56" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.22-k8s-nfs--server--provisioner--0-eth0" Jul 10 00:23:48.359995 env[1217]: 2025-07-10 00:23:48.338 [INFO][2738] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali60e51b789ff ContainerID="6614484fa5c871325cf0fc6d0b2bad3ced211aa7f7ff6fe8f622f473789ccf56" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.22-k8s-nfs--server--provisioner--0-eth0" Jul 10 00:23:48.359995 env[1217]: 2025-07-10 00:23:48.344 [INFO][2738] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="6614484fa5c871325cf0fc6d0b2bad3ced211aa7f7ff6fe8f622f473789ccf56" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.22-k8s-nfs--server--provisioner--0-eth0" Jul 10 00:23:48.360138 env[1217]: 2025-07-10 00:23:48.344 [INFO][2738] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="6614484fa5c871325cf0fc6d0b2bad3ced211aa7f7ff6fe8f622f473789ccf56" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.22-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.22-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"0d5c45da-3f22-46f2-9477-80db51458b5f", ResourceVersion:"1270", Generation:0, CreationTimestamp:time.Date(2025, time.July, 10, 0, 23, 47, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "apps.kubernetes.io/pod-index":"0", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.22", ContainerID:"6614484fa5c871325cf0fc6d0b2bad3ced211aa7f7ff6fe8f622f473789ccf56", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.12.195/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"2e:b3:ec:f5:59:b4", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Jul 10 00:23:48.360138 env[1217]: 2025-07-10 00:23:48.356 [INFO][2738] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="6614484fa5c871325cf0fc6d0b2bad3ced211aa7f7ff6fe8f622f473789ccf56" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.22-k8s-nfs--server--provisioner--0-eth0" Jul 10 00:23:48.368000 audit[2772]: NETFILTER_CFG table=filter:89 family=2 entries=40 op=nft_register_chain pid=2772 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 10 00:23:48.368000 audit[2772]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=20756 a0=3 a1=fffff84088d0 a2=0 a3=ffffa8fc6fa8 items=0 ppid=2166 pid=2772 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:23:48.368000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 10 00:23:48.374352 env[1217]: time="2025-07-10T00:23:48.374290381Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 10 00:23:48.374352 env[1217]: time="2025-07-10T00:23:48.374329941Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 10 00:23:48.374352 env[1217]: time="2025-07-10T00:23:48.374340901Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 10 00:23:48.374572 env[1217]: time="2025-07-10T00:23:48.374479100Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/6614484fa5c871325cf0fc6d0b2bad3ced211aa7f7ff6fe8f622f473789ccf56 pid=2782 runtime=io.containerd.runc.v2 Jul 10 00:23:48.389857 systemd[1]: Started cri-containerd-6614484fa5c871325cf0fc6d0b2bad3ced211aa7f7ff6fe8f622f473789ccf56.scope. Jul 10 00:23:48.411000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:48.411000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:48.411000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:48.411000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:48.411000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:48.411000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:48.411000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:48.411000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:48.411000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:48.411000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:48.411000 audit: BPF prog-id=115 op=LOAD Jul 10 00:23:48.411000 audit[2792]: AVC avc: denied { bpf } for pid=2792 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:48.411000 audit[2792]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=40001bdb38 a2=10 a3=0 items=0 ppid=2782 pid=2792 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:23:48.411000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3636313434383466613563383731333235636630666336643062326261 Jul 10 00:23:48.411000 audit[2792]: AVC avc: denied { perfmon } for pid=2792 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:48.411000 audit[2792]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001bd5a0 a2=3c a3=0 items=0 ppid=2782 pid=2792 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:23:48.411000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3636313434383466613563383731333235636630666336643062326261 Jul 10 00:23:48.411000 audit[2792]: AVC avc: denied { bpf } for pid=2792 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:48.411000 audit[2792]: AVC avc: denied { bpf } for pid=2792 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:48.411000 audit[2792]: AVC avc: denied { bpf } for pid=2792 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:48.411000 audit[2792]: AVC avc: denied { perfmon } for pid=2792 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:48.411000 audit[2792]: AVC avc: denied { perfmon } for pid=2792 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:48.411000 audit[2792]: AVC avc: denied { perfmon } for pid=2792 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:48.411000 audit[2792]: AVC avc: denied { perfmon } for pid=2792 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:48.411000 audit[2792]: AVC avc: denied { perfmon } for pid=2792 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:48.411000 audit[2792]: AVC avc: denied { bpf } for pid=2792 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:48.411000 audit[2792]: AVC avc: denied { bpf } for pid=2792 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:48.411000 audit: BPF prog-id=116 op=LOAD Jul 10 00:23:48.411000 audit[2792]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001bd8e0 a2=78 a3=0 items=0 ppid=2782 pid=2792 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:23:48.411000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3636313434383466613563383731333235636630666336643062326261 Jul 10 00:23:48.411000 audit[2792]: AVC avc: denied { bpf } for pid=2792 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:48.411000 audit[2792]: AVC avc: denied { bpf } for pid=2792 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:48.411000 audit[2792]: AVC avc: denied { perfmon } for pid=2792 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:48.411000 audit[2792]: AVC avc: denied { perfmon } for pid=2792 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:48.411000 audit[2792]: AVC avc: denied { perfmon } for pid=2792 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:48.411000 audit[2792]: AVC avc: denied { perfmon } for pid=2792 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:48.411000 audit[2792]: AVC avc: denied { perfmon } for pid=2792 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:48.411000 audit[2792]: AVC avc: denied { bpf } for pid=2792 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:48.411000 audit[2792]: AVC avc: denied { bpf } for pid=2792 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:48.411000 audit: BPF prog-id=117 op=LOAD Jul 10 00:23:48.411000 audit[2792]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=40001bd670 a2=78 a3=0 items=0 ppid=2782 pid=2792 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:23:48.411000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3636313434383466613563383731333235636630666336643062326261 Jul 10 00:23:48.411000 audit: BPF prog-id=117 op=UNLOAD Jul 10 00:23:48.411000 audit: BPF prog-id=116 op=UNLOAD Jul 10 00:23:48.411000 audit[2792]: AVC avc: denied { bpf } for pid=2792 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:48.411000 audit[2792]: AVC avc: denied { bpf } for pid=2792 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:48.411000 audit[2792]: AVC avc: denied { bpf } for pid=2792 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:48.411000 audit[2792]: AVC avc: denied { perfmon } for pid=2792 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:48.411000 audit[2792]: AVC avc: denied { perfmon } for pid=2792 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:48.411000 audit[2792]: AVC avc: denied { perfmon } for pid=2792 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:48.411000 audit[2792]: AVC avc: denied { perfmon } for pid=2792 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:48.411000 audit[2792]: AVC avc: denied { perfmon } for pid=2792 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:48.411000 audit[2792]: AVC avc: denied { bpf } for pid=2792 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:48.411000 audit[2792]: AVC avc: denied { bpf } for pid=2792 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:48.411000 audit: BPF prog-id=118 op=LOAD Jul 10 00:23:48.411000 audit[2792]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001bdb40 a2=78 a3=0 items=0 ppid=2782 pid=2792 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:23:48.411000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3636313434383466613563383731333235636630666336643062326261 Jul 10 00:23:48.414021 systemd-resolved[1157]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Jul 10 00:23:48.430796 env[1217]: time="2025-07-10T00:23:48.430662937Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:0d5c45da-3f22-46f2-9477-80db51458b5f,Namespace:default,Attempt:0,} returns sandbox id \"6614484fa5c871325cf0fc6d0b2bad3ced211aa7f7ff6fe8f622f473789ccf56\"" Jul 10 00:23:48.435917 env[1217]: time="2025-07-10T00:23:48.435816875Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\"" Jul 10 00:23:48.793412 kubelet[1455]: E0710 00:23:48.793263 1455 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 00:23:49.675669 systemd-networkd[1044]: cali60e51b789ff: Gained IPv6LL Jul 10 00:23:49.794455 kubelet[1455]: E0710 00:23:49.794385 1455 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 00:23:50.739666 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1214903689.mount: Deactivated successfully. Jul 10 00:23:50.795414 kubelet[1455]: E0710 00:23:50.795362 1455 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 00:23:51.796084 kubelet[1455]: E0710 00:23:51.796038 1455 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 00:23:52.449337 update_engine[1208]: I0710 00:23:52.449272 1208 update_attempter.cc:509] Updating boot flags... Jul 10 00:23:52.511958 env[1217]: time="2025-07-10T00:23:52.511271960Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 10 00:23:52.513109 env[1217]: time="2025-07-10T00:23:52.513070874Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:5a42a519e0a8cf95c3c5f18f767c58c8c8b072aaea0a26e5e47a6f206c7df685,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 10 00:23:52.517142 env[1217]: time="2025-07-10T00:23:52.517056700Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 10 00:23:52.519260 env[1217]: time="2025-07-10T00:23:52.519230693Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 10 00:23:52.521263 env[1217]: time="2025-07-10T00:23:52.521130647Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\" returns image reference \"sha256:5a42a519e0a8cf95c3c5f18f767c58c8c8b072aaea0a26e5e47a6f206c7df685\"" Jul 10 00:23:52.523680 env[1217]: time="2025-07-10T00:23:52.523637918Z" level=info msg="CreateContainer within sandbox \"6614484fa5c871325cf0fc6d0b2bad3ced211aa7f7ff6fe8f622f473789ccf56\" for container &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,}" Jul 10 00:23:52.535310 env[1217]: time="2025-07-10T00:23:52.535252440Z" level=info msg="CreateContainer within sandbox \"6614484fa5c871325cf0fc6d0b2bad3ced211aa7f7ff6fe8f622f473789ccf56\" for &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,} returns container id \"aac9c2a14fbe0fabee929607bb52b14cd595e9e220ae05d97a74fcc6fbde18d0\"" Jul 10 00:23:52.535914 env[1217]: time="2025-07-10T00:23:52.535878638Z" level=info msg="StartContainer for \"aac9c2a14fbe0fabee929607bb52b14cd595e9e220ae05d97a74fcc6fbde18d0\"" Jul 10 00:23:52.553569 systemd[1]: run-containerd-runc-k8s.io-aac9c2a14fbe0fabee929607bb52b14cd595e9e220ae05d97a74fcc6fbde18d0-runc.lGqE9N.mount: Deactivated successfully. Jul 10 00:23:52.555859 systemd[1]: Started cri-containerd-aac9c2a14fbe0fabee929607bb52b14cd595e9e220ae05d97a74fcc6fbde18d0.scope. Jul 10 00:23:52.603000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:52.603000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:52.603000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:52.603000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:52.603000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:52.603000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:52.603000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:52.603000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:52.603000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:52.603000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:52.603000 audit: BPF prog-id=119 op=LOAD Jul 10 00:23:52.604000 audit[2844]: AVC avc: denied { bpf } for pid=2844 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:52.604000 audit[2844]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=2782 pid=2844 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:23:52.604000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6161633963326131346662653066616265653932393630376262353262 Jul 10 00:23:52.604000 audit[2844]: AVC avc: denied { perfmon } for pid=2844 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:52.604000 audit[2844]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2782 pid=2844 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:23:52.604000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6161633963326131346662653066616265653932393630376262353262 Jul 10 00:23:52.604000 audit[2844]: AVC avc: denied { bpf } for pid=2844 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:52.604000 audit[2844]: AVC avc: denied { bpf } for pid=2844 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:52.604000 audit[2844]: AVC avc: denied { bpf } for pid=2844 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:52.604000 audit[2844]: AVC avc: denied { perfmon } for pid=2844 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:52.604000 audit[2844]: AVC avc: denied { perfmon } for pid=2844 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:52.604000 audit[2844]: AVC avc: denied { perfmon } for pid=2844 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:52.604000 audit[2844]: AVC avc: denied { perfmon } for pid=2844 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:52.604000 audit[2844]: AVC avc: denied { perfmon } for pid=2844 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:52.604000 audit[2844]: AVC avc: denied { bpf } for pid=2844 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:52.604000 audit[2844]: AVC avc: denied { bpf } for pid=2844 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:52.604000 audit: BPF prog-id=120 op=LOAD Jul 10 00:23:52.604000 audit[2844]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2782 pid=2844 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:23:52.604000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6161633963326131346662653066616265653932393630376262353262 Jul 10 00:23:52.605000 audit[2844]: AVC avc: denied { bpf } for pid=2844 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:52.605000 audit[2844]: AVC avc: denied { bpf } for pid=2844 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:52.605000 audit[2844]: AVC avc: denied { perfmon } for pid=2844 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:52.605000 audit[2844]: AVC avc: denied { perfmon } for pid=2844 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:52.605000 audit[2844]: AVC avc: denied { perfmon } for pid=2844 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:52.605000 audit[2844]: AVC avc: denied { perfmon } for pid=2844 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:52.605000 audit[2844]: AVC avc: denied { perfmon } for pid=2844 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:52.605000 audit[2844]: AVC avc: denied { bpf } for pid=2844 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:52.605000 audit[2844]: AVC avc: denied { bpf } for pid=2844 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:52.605000 audit: BPF prog-id=121 op=LOAD Jul 10 00:23:52.605000 audit[2844]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2782 pid=2844 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:23:52.605000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6161633963326131346662653066616265653932393630376262353262 Jul 10 00:23:52.606000 audit: BPF prog-id=121 op=UNLOAD Jul 10 00:23:52.606000 audit: BPF prog-id=120 op=UNLOAD Jul 10 00:23:52.606000 audit[2844]: AVC avc: denied { bpf } for pid=2844 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:52.606000 audit[2844]: AVC avc: denied { bpf } for pid=2844 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:52.606000 audit[2844]: AVC avc: denied { bpf } for pid=2844 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:52.606000 audit[2844]: AVC avc: denied { perfmon } for pid=2844 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:52.606000 audit[2844]: AVC avc: denied { perfmon } for pid=2844 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:52.606000 audit[2844]: AVC avc: denied { perfmon } for pid=2844 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:52.606000 audit[2844]: AVC avc: denied { perfmon } for pid=2844 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:52.606000 audit[2844]: AVC avc: denied { perfmon } for pid=2844 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:52.606000 audit[2844]: AVC avc: denied { bpf } for pid=2844 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:52.606000 audit[2844]: AVC avc: denied { bpf } for pid=2844 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:23:52.606000 audit: BPF prog-id=122 op=LOAD Jul 10 00:23:52.606000 audit[2844]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2782 pid=2844 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:23:52.606000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6161633963326131346662653066616265653932393630376262353262 Jul 10 00:23:52.623903 env[1217]: time="2025-07-10T00:23:52.623833904Z" level=info msg="StartContainer for \"aac9c2a14fbe0fabee929607bb52b14cd595e9e220ae05d97a74fcc6fbde18d0\" returns successfully" Jul 10 00:23:52.722000 audit[2874]: AVC avc: denied { search } for pid=2874 comm="rpcbind" name="crypto" dev="proc" ino=17706 scontext=system_u:system_r:svirt_lxc_net_t:s0:c308,c389 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Jul 10 00:23:52.722000 audit[2874]: SYSCALL arch=c00000b7 syscall=56 success=no exit=-13 a0=ffffffffffffff9c a1=ffffa42df000 a2=0 a3=0 items=0 ppid=2855 pid=2874 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="rpcbind" exe="/usr/bin/rpcbind" subj=system_u:system_r:svirt_lxc_net_t:s0:c308,c389 key=(null) Jul 10 00:23:52.722000 audit: PROCTITLE proctitle=2F7573722F7362696E2F72706362696E64002D77 Jul 10 00:23:52.773000 audit[2879]: AVC avc: denied { search } for pid=2879 comm="dbus-daemon" name="crypto" dev="proc" ino=17706 scontext=system_u:system_r:svirt_lxc_net_t:s0:c308,c389 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Jul 10 00:23:52.773000 audit[2879]: SYSCALL arch=c00000b7 syscall=56 success=no exit=-13 a0=ffffffffffffff9c a1=ffffa617f000 a2=0 a3=0 items=0 ppid=2855 pid=2879 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c308,c389 key=(null) Jul 10 00:23:52.773000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65 Jul 10 00:23:52.784000 audit[2880]: AVC avc: denied { watch } for pid=2880 comm="dbus-daemon" path="/usr/share/dbus-1/system.d" dev="overlay" ino=537639 scontext=system_u:system_r:svirt_lxc_net_t:s0:c308,c389 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c308,c389 tclass=dir permissive=0 Jul 10 00:23:52.784000 audit[2880]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6 a1=aaaaca142580 a2=2c8 a3=aaaaca130a60 items=0 ppid=2855 pid=2880 auid=4294967295 uid=81 gid=81 euid=81 suid=81 fsuid=81 egid=81 sgid=81 fsgid=81 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c308,c389 key=(null) Jul 10 00:23:52.784000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65 Jul 10 00:23:52.788000 audit[2881]: AVC avc: denied { read } for pid=2881 comm="ganesha.nfsd" name="overcommit_memory" dev="proc" ino=16185 scontext=system_u:system_r:svirt_lxc_net_t:s0:c308,c389 tcontext=system_u:object_r:sysctl_vm_overcommit_t:s0 tclass=file permissive=0 Jul 10 00:23:52.788000 audit[2881]: SYSCALL arch=c00000b7 syscall=56 success=no exit=-13 a0=ffffff9c a1=ffffaf40a570 a2=80000 a3=0 items=0 ppid=2855 pid=2881 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c308,c389 key=(null) Jul 10 00:23:52.788000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66 Jul 10 00:23:52.789000 audit[2881]: AVC avc: denied { search } for pid=2881 comm="ganesha.nfsd" name="crypto" dev="proc" ino=17706 scontext=system_u:system_r:svirt_lxc_net_t:s0:c308,c389 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Jul 10 00:23:52.789000 audit[2881]: SYSCALL arch=c00000b7 syscall=56 success=no exit=-13 a0=ffffffffffffff9c a1=ffffae79f000 a2=0 a3=0 items=0 ppid=2855 pid=2881 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c308,c389 key=(null) Jul 10 00:23:52.789000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66 Jul 10 00:23:52.796582 kubelet[1455]: E0710 00:23:52.796509 1455 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 00:23:53.043876 kubelet[1455]: I0710 00:23:53.043740 1455 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="default/nfs-server-provisioner-0" podStartSLOduration=1.956559546 podStartE2EDuration="6.043722471s" podCreationTimestamp="2025-07-10 00:23:47 +0000 UTC" firstStartedPulling="2025-07-10 00:23:48.435157558 +0000 UTC m=+35.228153033" lastFinishedPulling="2025-07-10 00:23:52.522320483 +0000 UTC m=+39.315315958" observedRunningTime="2025-07-10 00:23:53.043015554 +0000 UTC m=+39.836011029" watchObservedRunningTime="2025-07-10 00:23:53.043722471 +0000 UTC m=+39.836717946" Jul 10 00:23:53.058000 audit[2899]: NETFILTER_CFG table=filter:90 family=2 entries=22 op=nft_register_rule pid=2899 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 10 00:23:53.061310 kernel: kauditd_printk_skb: 134 callbacks suppressed Jul 10 00:23:53.061389 kernel: audit: type=1325 audit(1752107033.058:770): table=filter:90 family=2 entries=22 op=nft_register_rule pid=2899 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 10 00:23:53.061415 kernel: audit: type=1300 audit(1752107033.058:770): arch=c00000b7 syscall=211 success=yes exit=3760 a0=3 a1=ffffe836afb0 a2=0 a3=1 items=0 ppid=1727 pid=2899 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:23:53.058000 audit[2899]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3760 a0=3 a1=ffffe836afb0 a2=0 a3=1 items=0 ppid=1727 pid=2899 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:23:53.058000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 10 00:23:53.066016 kernel: audit: type=1327 audit(1752107033.058:770): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 10 00:23:53.067000 audit[2899]: NETFILTER_CFG table=nat:91 family=2 entries=108 op=nft_register_chain pid=2899 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 10 00:23:53.067000 audit[2899]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=50220 a0=3 a1=ffffe836afb0 a2=0 a3=1 items=0 ppid=1727 pid=2899 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:23:53.072566 kernel: audit: type=1325 audit(1752107033.067:771): table=nat:91 family=2 entries=108 op=nft_register_chain pid=2899 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 10 00:23:53.072642 kernel: audit: type=1300 audit(1752107033.067:771): arch=c00000b7 syscall=211 success=yes exit=50220 a0=3 a1=ffffe836afb0 a2=0 a3=1 items=0 ppid=1727 pid=2899 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:23:53.072666 kernel: audit: type=1327 audit(1752107033.067:771): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 10 00:23:53.067000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 10 00:23:53.762788 kubelet[1455]: E0710 00:23:53.762743 1455 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 00:23:53.797667 kubelet[1455]: E0710 00:23:53.797629 1455 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 00:23:54.798332 kubelet[1455]: E0710 00:23:54.798291 1455 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 00:23:55.698000 audit[2903]: NETFILTER_CFG table=filter:92 family=2 entries=9 op=nft_register_rule pid=2903 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 10 00:23:55.698000 audit[2903]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3016 a0=3 a1=ffffc0392810 a2=0 a3=1 items=0 ppid=1727 pid=2903 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:23:55.703593 kernel: audit: type=1325 audit(1752107035.698:772): table=filter:92 family=2 entries=9 op=nft_register_rule pid=2903 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 10 00:23:55.703659 kernel: audit: type=1300 audit(1752107035.698:772): arch=c00000b7 syscall=211 success=yes exit=3016 a0=3 a1=ffffc0392810 a2=0 a3=1 items=0 ppid=1727 pid=2903 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:23:55.703684 kernel: audit: type=1327 audit(1752107035.698:772): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 10 00:23:55.698000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 10 00:23:55.717000 audit[2903]: NETFILTER_CFG table=nat:93 family=2 entries=55 op=nft_register_chain pid=2903 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 10 00:23:55.717000 audit[2903]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=20100 a0=3 a1=ffffc0392810 a2=0 a3=1 items=0 ppid=1727 pid=2903 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:23:55.717000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 10 00:23:55.719469 kernel: audit: type=1325 audit(1752107035.717:773): table=nat:93 family=2 entries=55 op=nft_register_chain pid=2903 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 10 00:23:55.798429 kubelet[1455]: E0710 00:23:55.798391 1455 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 00:23:56.799503 kubelet[1455]: E0710 00:23:56.799457 1455 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 00:23:57.800526 kubelet[1455]: E0710 00:23:57.800480 1455 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 00:23:58.801378 kubelet[1455]: E0710 00:23:58.801335 1455 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 00:23:59.001907 systemd[1]: run-containerd-runc-k8s.io-7487df16f2cc2d13445272ddd1b01837bc3691ad4b906769b2e270d216ae82de-runc.19wiGq.mount: Deactivated successfully. Jul 10 00:23:59.802360 kubelet[1455]: E0710 00:23:59.802324 1455 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 00:24:00.803165 kubelet[1455]: E0710 00:24:00.803126 1455 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 00:24:01.804061 kubelet[1455]: E0710 00:24:01.804007 1455 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 00:24:02.173572 systemd[1]: Created slice kubepods-besteffort-pod97560c8d_bc12_473b_9222_73619d2d473c.slice. Jul 10 00:24:02.337548 kubelet[1455]: I0710 00:24:02.337488 1455 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"pvc-2fb28edd-c8bb-4d49-bece-a9920a9c816d\" (UniqueName: \"kubernetes.io/nfs/97560c8d-bc12-473b-9222-73619d2d473c-pvc-2fb28edd-c8bb-4d49-bece-a9920a9c816d\") pod \"test-pod-1\" (UID: \"97560c8d-bc12-473b-9222-73619d2d473c\") " pod="default/test-pod-1" Jul 10 00:24:02.337548 kubelet[1455]: I0710 00:24:02.337548 1455 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-pddj5\" (UniqueName: \"kubernetes.io/projected/97560c8d-bc12-473b-9222-73619d2d473c-kube-api-access-pddj5\") pod \"test-pod-1\" (UID: \"97560c8d-bc12-473b-9222-73619d2d473c\") " pod="default/test-pod-1" Jul 10 00:24:02.454000 audit[2934]: AVC avc: denied { confidentiality } for pid=2934 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:24:02.458467 kernel: kauditd_printk_skb: 2 callbacks suppressed Jul 10 00:24:02.458573 kernel: audit: type=1400 audit(1752107042.454:774): avc: denied { confidentiality } for pid=2934 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:24:02.458683 kernel: Failed to create system directory netfs Jul 10 00:24:02.454000 audit[2934]: AVC avc: denied { confidentiality } for pid=2934 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:24:02.463436 kernel: Failed to create system directory netfs Jul 10 00:24:02.463496 kernel: audit: type=1400 audit(1752107042.454:774): avc: denied { confidentiality } for pid=2934 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:24:02.463514 kernel: Failed to create system directory netfs Jul 10 00:24:02.463535 kernel: audit: type=1400 audit(1752107042.454:774): avc: denied { confidentiality } for pid=2934 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:24:02.454000 audit[2934]: AVC avc: denied { confidentiality } for pid=2934 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:24:02.465882 kernel: Failed to create system directory netfs Jul 10 00:24:02.465928 kernel: audit: type=1400 audit(1752107042.454:774): avc: denied { confidentiality } for pid=2934 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:24:02.454000 audit[2934]: AVC avc: denied { confidentiality } for pid=2934 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:24:02.454000 audit[2934]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=aaaae86ca5e0 a1=12c14 a2=aaaadd18e028 a3=aaaae86bb010 items=0 ppid=647 pid=2934 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:24:02.473534 kernel: audit: type=1300 audit(1752107042.454:774): arch=c00000b7 syscall=105 success=yes exit=0 a0=aaaae86ca5e0 a1=12c14 a2=aaaadd18e028 a3=aaaae86bb010 items=0 ppid=647 pid=2934 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:24:02.454000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Jul 10 00:24:02.474646 kernel: audit: type=1327 audit(1752107042.454:774): proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Jul 10 00:24:02.470000 audit[2934]: AVC avc: denied { confidentiality } for pid=2934 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:24:02.478200 kernel: Failed to create system directory fscache Jul 10 00:24:02.478285 kernel: audit: type=1400 audit(1752107042.470:775): avc: denied { confidentiality } for pid=2934 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:24:02.478316 kernel: Failed to create system directory fscache Jul 10 00:24:02.478331 kernel: audit: type=1400 audit(1752107042.470:775): avc: denied { confidentiality } for pid=2934 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:24:02.470000 audit[2934]: AVC avc: denied { confidentiality } for pid=2934 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:24:02.480616 kernel: Failed to create system directory fscache Jul 10 00:24:02.480669 kernel: audit: type=1400 audit(1752107042.470:775): avc: denied { confidentiality } for pid=2934 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:24:02.470000 audit[2934]: AVC avc: denied { confidentiality } for pid=2934 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:24:02.482884 kernel: Failed to create system directory fscache Jul 10 00:24:02.470000 audit[2934]: AVC avc: denied { confidentiality } for pid=2934 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:24:02.485205 kernel: audit: type=1400 audit(1752107042.470:775): avc: denied { confidentiality } for pid=2934 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:24:02.485254 kernel: Failed to create system directory fscache Jul 10 00:24:02.485635 kernel: Failed to create system directory fscache Jul 10 00:24:02.470000 audit[2934]: AVC avc: denied { confidentiality } for pid=2934 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:24:02.470000 audit[2934]: AVC avc: denied { confidentiality } for pid=2934 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:24:02.470000 audit[2934]: AVC avc: denied { confidentiality } for pid=2934 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:24:02.486458 kernel: Failed to create system directory fscache Jul 10 00:24:02.486481 kernel: Failed to create system directory fscache Jul 10 00:24:02.470000 audit[2934]: AVC avc: denied { confidentiality } for pid=2934 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:24:02.487643 kernel: Failed to create system directory fscache Jul 10 00:24:02.487708 kernel: Failed to create system directory fscache Jul 10 00:24:02.487729 kernel: Failed to create system directory fscache Jul 10 00:24:02.470000 audit[2934]: AVC avc: denied { confidentiality } for pid=2934 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:24:02.470000 audit[2934]: AVC avc: denied { confidentiality } for pid=2934 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:24:02.470000 audit[2934]: AVC avc: denied { confidentiality } for pid=2934 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:24:02.470000 audit[2934]: AVC avc: denied { confidentiality } for pid=2934 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:24:02.488579 kernel: Failed to create system directory fscache Jul 10 00:24:02.488613 kernel: Failed to create system directory fscache Jul 10 00:24:02.470000 audit[2934]: AVC avc: denied { confidentiality } for pid=2934 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:24:02.470000 audit[2934]: AVC avc: denied { confidentiality } for pid=2934 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:24:02.489463 kernel: Failed to create system directory fscache Jul 10 00:24:02.470000 audit[2934]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=aaaae88dd210 a1=4c344 a2=aaaadd18e028 a3=aaaae86bb010 items=0 ppid=647 pid=2934 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:24:02.492514 kernel: FS-Cache: Loaded Jul 10 00:24:02.470000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Jul 10 00:24:02.507000 audit[2934]: AVC avc: denied { confidentiality } for pid=2934 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:24:02.507000 audit[2934]: AVC avc: denied { confidentiality } for pid=2934 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:24:02.507000 audit[2934]: AVC avc: denied { confidentiality } for pid=2934 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:24:02.514868 kernel: Failed to create system directory sunrpc Jul 10 00:24:02.514925 kernel: Failed to create system directory sunrpc Jul 10 00:24:02.514943 kernel: Failed to create system directory sunrpc Jul 10 00:24:02.514966 kernel: Failed to create system directory sunrpc Jul 10 00:24:02.507000 audit[2934]: AVC avc: denied { confidentiality } for pid=2934 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:24:02.507000 audit[2934]: AVC avc: denied { confidentiality } for pid=2934 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:24:02.515757 kernel: Failed to create system directory sunrpc Jul 10 00:24:02.515801 kernel: Failed to create system directory sunrpc Jul 10 00:24:02.507000 audit[2934]: AVC avc: denied { confidentiality } for pid=2934 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:24:02.507000 audit[2934]: AVC avc: denied { confidentiality } for pid=2934 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:24:02.516630 kernel: Failed to create system directory sunrpc Jul 10 00:24:02.516666 kernel: Failed to create system directory sunrpc Jul 10 00:24:02.507000 audit[2934]: AVC avc: denied { confidentiality } for pid=2934 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:24:02.507000 audit[2934]: AVC avc: denied { confidentiality } for pid=2934 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:24:02.517525 kernel: Failed to create system directory sunrpc Jul 10 00:24:02.517560 kernel: Failed to create system directory sunrpc Jul 10 00:24:02.507000 audit[2934]: AVC avc: denied { confidentiality } for pid=2934 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:24:02.507000 audit[2934]: AVC avc: denied { confidentiality } for pid=2934 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:24:02.507000 audit[2934]: AVC avc: denied { confidentiality } for pid=2934 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:24:02.518836 kernel: Failed to create system directory sunrpc Jul 10 00:24:02.518877 kernel: Failed to create system directory sunrpc Jul 10 00:24:02.518897 kernel: Failed to create system directory sunrpc Jul 10 00:24:02.507000 audit[2934]: AVC avc: denied { confidentiality } for pid=2934 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:24:02.507000 audit[2934]: AVC avc: denied { confidentiality } for pid=2934 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:24:02.519749 kernel: Failed to create system directory sunrpc Jul 10 00:24:02.519783 kernel: Failed to create system directory sunrpc Jul 10 00:24:02.507000 audit[2934]: AVC avc: denied { confidentiality } for pid=2934 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:24:02.507000 audit[2934]: AVC avc: denied { confidentiality } for pid=2934 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:24:02.520631 kernel: Failed to create system directory sunrpc Jul 10 00:24:02.520673 kernel: Failed to create system directory sunrpc Jul 10 00:24:02.507000 audit[2934]: AVC avc: denied { confidentiality } for pid=2934 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:24:02.507000 audit[2934]: AVC avc: denied { confidentiality } for pid=2934 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:24:02.521483 kernel: Failed to create system directory sunrpc Jul 10 00:24:02.521510 kernel: Failed to create system directory sunrpc Jul 10 00:24:02.507000 audit[2934]: AVC avc: denied { confidentiality } for pid=2934 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:24:02.507000 audit[2934]: AVC avc: denied { confidentiality } for pid=2934 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:24:02.507000 audit[2934]: AVC avc: denied { confidentiality } for pid=2934 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:24:02.522794 kernel: Failed to create system directory sunrpc Jul 10 00:24:02.522828 kernel: Failed to create system directory sunrpc Jul 10 00:24:02.522847 kernel: Failed to create system directory sunrpc Jul 10 00:24:02.507000 audit[2934]: AVC avc: denied { confidentiality } for pid=2934 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:24:02.507000 audit[2934]: AVC avc: denied { confidentiality } for pid=2934 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:24:02.523723 kernel: Failed to create system directory sunrpc Jul 10 00:24:02.523749 kernel: Failed to create system directory sunrpc Jul 10 00:24:02.507000 audit[2934]: AVC avc: denied { confidentiality } for pid=2934 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:24:02.507000 audit[2934]: AVC avc: denied { confidentiality } for pid=2934 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:24:02.524562 kernel: Failed to create system directory sunrpc Jul 10 00:24:02.524597 kernel: Failed to create system directory sunrpc Jul 10 00:24:02.507000 audit[2934]: AVC avc: denied { confidentiality } for pid=2934 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:24:02.507000 audit[2934]: AVC avc: denied { confidentiality } for pid=2934 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:24:02.507000 audit[2934]: AVC avc: denied { confidentiality } for pid=2934 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:24:02.525869 kernel: Failed to create system directory sunrpc Jul 10 00:24:02.525895 kernel: Failed to create system directory sunrpc Jul 10 00:24:02.525909 kernel: Failed to create system directory sunrpc Jul 10 00:24:02.507000 audit[2934]: AVC avc: denied { confidentiality } for pid=2934 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:24:02.507000 audit[2934]: AVC avc: denied { confidentiality } for pid=2934 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:24:02.526746 kernel: Failed to create system directory sunrpc Jul 10 00:24:02.526773 kernel: Failed to create system directory sunrpc Jul 10 00:24:02.507000 audit[2934]: AVC avc: denied { confidentiality } for pid=2934 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:24:02.507000 audit[2934]: AVC avc: denied { confidentiality } for pid=2934 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:24:02.527627 kernel: Failed to create system directory sunrpc Jul 10 00:24:02.527663 kernel: Failed to create system directory sunrpc Jul 10 00:24:02.507000 audit[2934]: AVC avc: denied { confidentiality } for pid=2934 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:24:02.507000 audit[2934]: AVC avc: denied { confidentiality } for pid=2934 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:24:02.528566 kernel: Failed to create system directory sunrpc Jul 10 00:24:02.528599 kernel: Failed to create system directory sunrpc Jul 10 00:24:02.507000 audit[2934]: AVC avc: denied { confidentiality } for pid=2934 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:24:02.507000 audit[2934]: AVC avc: denied { confidentiality } for pid=2934 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:24:02.529468 kernel: Failed to create system directory sunrpc Jul 10 00:24:02.529489 kernel: Failed to create system directory sunrpc Jul 10 00:24:02.507000 audit[2934]: AVC avc: denied { confidentiality } for pid=2934 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:24:02.507000 audit[2934]: AVC avc: denied { confidentiality } for pid=2934 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:24:02.507000 audit[2934]: AVC avc: denied { confidentiality } for pid=2934 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:24:02.530757 kernel: Failed to create system directory sunrpc Jul 10 00:24:02.530782 kernel: Failed to create system directory sunrpc Jul 10 00:24:02.530795 kernel: Failed to create system directory sunrpc Jul 10 00:24:02.507000 audit[2934]: AVC avc: denied { confidentiality } for pid=2934 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:24:02.507000 audit[2934]: AVC avc: denied { confidentiality } for pid=2934 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:24:02.531657 kernel: Failed to create system directory sunrpc Jul 10 00:24:02.531700 kernel: Failed to create system directory sunrpc Jul 10 00:24:02.507000 audit[2934]: AVC avc: denied { confidentiality } for pid=2934 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:24:02.507000 audit[2934]: AVC avc: denied { confidentiality } for pid=2934 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:24:02.532493 kernel: Failed to create system directory sunrpc Jul 10 00:24:02.532529 kernel: Failed to create system directory sunrpc Jul 10 00:24:02.507000 audit[2934]: AVC avc: denied { confidentiality } for pid=2934 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:24:02.507000 audit[2934]: AVC avc: denied { confidentiality } for pid=2934 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:24:02.507000 audit[2934]: AVC avc: denied { confidentiality } for pid=2934 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:24:02.533824 kernel: Failed to create system directory sunrpc Jul 10 00:24:02.533856 kernel: Failed to create system directory sunrpc Jul 10 00:24:02.533875 kernel: Failed to create system directory sunrpc Jul 10 00:24:02.507000 audit[2934]: AVC avc: denied { confidentiality } for pid=2934 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:24:02.507000 audit[2934]: AVC avc: denied { confidentiality } for pid=2934 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:24:02.534749 kernel: Failed to create system directory sunrpc Jul 10 00:24:02.507000 audit[2934]: AVC avc: denied { confidentiality } for pid=2934 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:24:02.507000 audit[2934]: AVC avc: denied { confidentiality } for pid=2934 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:24:02.535696 kernel: Failed to create system directory sunrpc Jul 10 00:24:02.535744 kernel: Failed to create system directory sunrpc Jul 10 00:24:02.535763 kernel: Failed to create system directory sunrpc Jul 10 00:24:02.507000 audit[2934]: AVC avc: denied { confidentiality } for pid=2934 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:24:02.507000 audit[2934]: AVC avc: denied { confidentiality } for pid=2934 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:24:02.536618 kernel: Failed to create system directory sunrpc Jul 10 00:24:02.536646 kernel: Failed to create system directory sunrpc Jul 10 00:24:02.507000 audit[2934]: AVC avc: denied { confidentiality } for pid=2934 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:24:02.507000 audit[2934]: AVC avc: denied { confidentiality } for pid=2934 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:24:02.537496 kernel: Failed to create system directory sunrpc Jul 10 00:24:02.537522 kernel: Failed to create system directory sunrpc Jul 10 00:24:02.507000 audit[2934]: AVC avc: denied { confidentiality } for pid=2934 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:24:02.507000 audit[2934]: AVC avc: denied { confidentiality } for pid=2934 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:24:02.507000 audit[2934]: AVC avc: denied { confidentiality } for pid=2934 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:24:02.538883 kernel: Failed to create system directory sunrpc Jul 10 00:24:02.538916 kernel: Failed to create system directory sunrpc Jul 10 00:24:02.538930 kernel: Failed to create system directory sunrpc Jul 10 00:24:02.507000 audit[2934]: AVC avc: denied { confidentiality } for pid=2934 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:24:02.507000 audit[2934]: AVC avc: denied { confidentiality } for pid=2934 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:24:02.539811 kernel: Failed to create system directory sunrpc Jul 10 00:24:02.539832 kernel: Failed to create system directory sunrpc Jul 10 00:24:02.507000 audit[2934]: AVC avc: denied { confidentiality } for pid=2934 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:24:02.507000 audit[2934]: AVC avc: denied { confidentiality } for pid=2934 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:24:02.540731 kernel: Failed to create system directory sunrpc Jul 10 00:24:02.540762 kernel: Failed to create system directory sunrpc Jul 10 00:24:02.507000 audit[2934]: AVC avc: denied { confidentiality } for pid=2934 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:24:02.507000 audit[2934]: AVC avc: denied { confidentiality } for pid=2934 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:24:02.541701 kernel: Failed to create system directory sunrpc Jul 10 00:24:02.541741 kernel: Failed to create system directory sunrpc Jul 10 00:24:02.507000 audit[2934]: AVC avc: denied { confidentiality } for pid=2934 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:24:02.507000 audit[2934]: AVC avc: denied { confidentiality } for pid=2934 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:24:02.542579 kernel: Failed to create system directory sunrpc Jul 10 00:24:02.542616 kernel: Failed to create system directory sunrpc Jul 10 00:24:02.507000 audit[2934]: AVC avc: denied { confidentiality } for pid=2934 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:24:02.507000 audit[2934]: AVC avc: denied { confidentiality } for pid=2934 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:24:02.543456 kernel: Failed to create system directory sunrpc Jul 10 00:24:02.543489 kernel: Failed to create system directory sunrpc Jul 10 00:24:02.507000 audit[2934]: AVC avc: denied { confidentiality } for pid=2934 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:24:02.507000 audit[2934]: AVC avc: denied { confidentiality } for pid=2934 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:24:02.507000 audit[2934]: AVC avc: denied { confidentiality } for pid=2934 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:24:02.544823 kernel: Failed to create system directory sunrpc Jul 10 00:24:02.544865 kernel: Failed to create system directory sunrpc Jul 10 00:24:02.544887 kernel: Failed to create system directory sunrpc Jul 10 00:24:02.507000 audit[2934]: AVC avc: denied { confidentiality } for pid=2934 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:24:02.507000 audit[2934]: AVC avc: denied { confidentiality } for pid=2934 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:24:02.545768 kernel: Failed to create system directory sunrpc Jul 10 00:24:02.545805 kernel: Failed to create system directory sunrpc Jul 10 00:24:02.507000 audit[2934]: AVC avc: denied { confidentiality } for pid=2934 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:24:02.507000 audit[2934]: AVC avc: denied { confidentiality } for pid=2934 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:24:02.546729 kernel: Failed to create system directory sunrpc Jul 10 00:24:02.546766 kernel: Failed to create system directory sunrpc Jul 10 00:24:02.507000 audit[2934]: AVC avc: denied { confidentiality } for pid=2934 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:24:02.507000 audit[2934]: AVC avc: denied { confidentiality } for pid=2934 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:24:02.547614 kernel: Failed to create system directory sunrpc Jul 10 00:24:02.547642 kernel: Failed to create system directory sunrpc Jul 10 00:24:02.507000 audit[2934]: AVC avc: denied { confidentiality } for pid=2934 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:24:02.507000 audit[2934]: AVC avc: denied { confidentiality } for pid=2934 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:24:02.548489 kernel: Failed to create system directory sunrpc Jul 10 00:24:02.548519 kernel: Failed to create system directory sunrpc Jul 10 00:24:02.507000 audit[2934]: AVC avc: denied { confidentiality } for pid=2934 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:24:02.507000 audit[2934]: AVC avc: denied { confidentiality } for pid=2934 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:24:02.507000 audit[2934]: AVC avc: denied { confidentiality } for pid=2934 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:24:02.549800 kernel: Failed to create system directory sunrpc Jul 10 00:24:02.549827 kernel: Failed to create system directory sunrpc Jul 10 00:24:02.549859 kernel: Failed to create system directory sunrpc Jul 10 00:24:02.507000 audit[2934]: AVC avc: denied { confidentiality } for pid=2934 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:24:02.507000 audit[2934]: AVC avc: denied { confidentiality } for pid=2934 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:24:02.550717 kernel: Failed to create system directory sunrpc Jul 10 00:24:02.550745 kernel: Failed to create system directory sunrpc Jul 10 00:24:02.507000 audit[2934]: AVC avc: denied { confidentiality } for pid=2934 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:24:02.507000 audit[2934]: AVC avc: denied { confidentiality } for pid=2934 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:24:02.551673 kernel: Failed to create system directory sunrpc Jul 10 00:24:02.551717 kernel: Failed to create system directory sunrpc Jul 10 00:24:02.507000 audit[2934]: AVC avc: denied { confidentiality } for pid=2934 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:24:02.507000 audit[2934]: AVC avc: denied { confidentiality } for pid=2934 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:24:02.552529 kernel: Failed to create system directory sunrpc Jul 10 00:24:02.552555 kernel: Failed to create system directory sunrpc Jul 10 00:24:02.507000 audit[2934]: AVC avc: denied { confidentiality } for pid=2934 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:24:02.507000 audit[2934]: AVC avc: denied { confidentiality } for pid=2934 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:24:02.507000 audit[2934]: AVC avc: denied { confidentiality } for pid=2934 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:24:02.553825 kernel: Failed to create system directory sunrpc Jul 10 00:24:02.553861 kernel: Failed to create system directory sunrpc Jul 10 00:24:02.553875 kernel: Failed to create system directory sunrpc Jul 10 00:24:02.507000 audit[2934]: AVC avc: denied { confidentiality } for pid=2934 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:24:02.507000 audit[2934]: AVC avc: denied { confidentiality } for pid=2934 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:24:02.554763 kernel: Failed to create system directory sunrpc Jul 10 00:24:02.554784 kernel: Failed to create system directory sunrpc Jul 10 00:24:02.507000 audit[2934]: AVC avc: denied { confidentiality } for pid=2934 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:24:02.507000 audit[2934]: AVC avc: denied { confidentiality } for pid=2934 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:24:02.555705 kernel: Failed to create system directory sunrpc Jul 10 00:24:02.555742 kernel: Failed to create system directory sunrpc Jul 10 00:24:02.507000 audit[2934]: AVC avc: denied { confidentiality } for pid=2934 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:24:02.507000 audit[2934]: AVC avc: denied { confidentiality } for pid=2934 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:24:02.556640 kernel: Failed to create system directory sunrpc Jul 10 00:24:02.556677 kernel: Failed to create system directory sunrpc Jul 10 00:24:02.507000 audit[2934]: AVC avc: denied { confidentiality } for pid=2934 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:24:02.507000 audit[2934]: AVC avc: denied { confidentiality } for pid=2934 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:24:02.557532 kernel: Failed to create system directory sunrpc Jul 10 00:24:02.557584 kernel: Failed to create system directory sunrpc Jul 10 00:24:02.507000 audit[2934]: AVC avc: denied { confidentiality } for pid=2934 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:24:02.507000 audit[2934]: AVC avc: denied { confidentiality } for pid=2934 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:24:02.558504 kernel: Failed to create system directory sunrpc Jul 10 00:24:02.558548 kernel: Failed to create system directory sunrpc Jul 10 00:24:02.507000 audit[2934]: AVC avc: denied { confidentiality } for pid=2934 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:24:02.507000 audit[2934]: AVC avc: denied { confidentiality } for pid=2934 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:24:02.507000 audit[2934]: AVC avc: denied { confidentiality } for pid=2934 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:24:02.559865 kernel: Failed to create system directory sunrpc Jul 10 00:24:02.559910 kernel: Failed to create system directory sunrpc Jul 10 00:24:02.559924 kernel: Failed to create system directory sunrpc Jul 10 00:24:02.507000 audit[2934]: AVC avc: denied { confidentiality } for pid=2934 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:24:02.507000 audit[2934]: AVC avc: denied { confidentiality } for pid=2934 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:24:02.560759 kernel: Failed to create system directory sunrpc Jul 10 00:24:02.560790 kernel: Failed to create system directory sunrpc Jul 10 00:24:02.507000 audit[2934]: AVC avc: denied { confidentiality } for pid=2934 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:24:02.507000 audit[2934]: AVC avc: denied { confidentiality } for pid=2934 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:24:02.561685 kernel: Failed to create system directory sunrpc Jul 10 00:24:02.561729 kernel: Failed to create system directory sunrpc Jul 10 00:24:02.507000 audit[2934]: AVC avc: denied { confidentiality } for pid=2934 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:24:02.507000 audit[2934]: AVC avc: denied { confidentiality } for pid=2934 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:24:02.562554 kernel: Failed to create system directory sunrpc Jul 10 00:24:02.562580 kernel: Failed to create system directory sunrpc Jul 10 00:24:02.507000 audit[2934]: AVC avc: denied { confidentiality } for pid=2934 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:24:02.507000 audit[2934]: AVC avc: denied { confidentiality } for pid=2934 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:24:02.563483 kernel: Failed to create system directory sunrpc Jul 10 00:24:02.563510 kernel: Failed to create system directory sunrpc Jul 10 00:24:02.507000 audit[2934]: AVC avc: denied { confidentiality } for pid=2934 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:24:02.507000 audit[2934]: AVC avc: denied { confidentiality } for pid=2934 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:24:02.507000 audit[2934]: AVC avc: denied { confidentiality } for pid=2934 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:24:02.564796 kernel: Failed to create system directory sunrpc Jul 10 00:24:02.564825 kernel: Failed to create system directory sunrpc Jul 10 00:24:02.564852 kernel: Failed to create system directory sunrpc Jul 10 00:24:02.507000 audit[2934]: AVC avc: denied { confidentiality } for pid=2934 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:24:02.507000 audit[2934]: AVC avc: denied { confidentiality } for pid=2934 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:24:02.565693 kernel: Failed to create system directory sunrpc Jul 10 00:24:02.565739 kernel: Failed to create system directory sunrpc Jul 10 00:24:02.507000 audit[2934]: AVC avc: denied { confidentiality } for pid=2934 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:24:02.507000 audit[2934]: AVC avc: denied { confidentiality } for pid=2934 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:24:02.566563 kernel: Failed to create system directory sunrpc Jul 10 00:24:02.566590 kernel: Failed to create system directory sunrpc Jul 10 00:24:02.507000 audit[2934]: AVC avc: denied { confidentiality } for pid=2934 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:24:02.507000 audit[2934]: AVC avc: denied { confidentiality } for pid=2934 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:24:02.507000 audit[2934]: AVC avc: denied { confidentiality } for pid=2934 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:24:02.567976 kernel: Failed to create system directory sunrpc Jul 10 00:24:02.567999 kernel: Failed to create system directory sunrpc Jul 10 00:24:02.568015 kernel: Failed to create system directory sunrpc Jul 10 00:24:02.507000 audit[2934]: AVC avc: denied { confidentiality } for pid=2934 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:24:02.507000 audit[2934]: AVC avc: denied { confidentiality } for pid=2934 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:24:02.568921 kernel: Failed to create system directory sunrpc Jul 10 00:24:02.568946 kernel: Failed to create system directory sunrpc Jul 10 00:24:02.507000 audit[2934]: AVC avc: denied { confidentiality } for pid=2934 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:24:02.507000 audit[2934]: AVC avc: denied { confidentiality } for pid=2934 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:24:02.569845 kernel: Failed to create system directory sunrpc Jul 10 00:24:02.569877 kernel: Failed to create system directory sunrpc Jul 10 00:24:02.507000 audit[2934]: AVC avc: denied { confidentiality } for pid=2934 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:24:02.579666 kernel: RPC: Registered named UNIX socket transport module. Jul 10 00:24:02.579734 kernel: RPC: Registered udp transport module. Jul 10 00:24:02.579766 kernel: RPC: Registered tcp transport module. Jul 10 00:24:02.580683 kernel: RPC: Registered tcp NFSv4.1 backchannel transport module. Jul 10 00:24:02.507000 audit[2934]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=aaaae8929560 a1=14a74c a2=aaaadd18e028 a3=aaaae86bb010 items=6 ppid=647 pid=2934 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:24:02.507000 audit: CWD cwd="/" Jul 10 00:24:02.507000 audit: PATH item=0 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:24:02.507000 audit: PATH item=1 name=(null) inode=17797 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:24:02.507000 audit: PATH item=2 name=(null) inode=17797 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:24:02.507000 audit: PATH item=3 name=(null) inode=17798 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:24:02.507000 audit: PATH item=4 name=(null) inode=17797 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:24:02.507000 audit: PATH item=5 name=(null) inode=17799 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:24:02.507000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Jul 10 00:24:02.601000 audit[2934]: AVC avc: denied { confidentiality } for pid=2934 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:24:02.601000 audit[2934]: AVC avc: denied { confidentiality } for pid=2934 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:24:02.608831 kernel: Failed to create system directory nfs Jul 10 00:24:02.608892 kernel: Failed to create system directory nfs Jul 10 00:24:02.608907 kernel: Failed to create system directory nfs Jul 10 00:24:02.601000 audit[2934]: AVC avc: denied { confidentiality } for pid=2934 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:24:02.601000 audit[2934]: AVC avc: denied { confidentiality } for pid=2934 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:24:02.609666 kernel: Failed to create system directory nfs Jul 10 00:24:02.609701 kernel: Failed to create system directory nfs Jul 10 00:24:02.601000 audit[2934]: AVC avc: denied { confidentiality } for pid=2934 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:24:02.601000 audit[2934]: AVC avc: denied { confidentiality } for pid=2934 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:24:02.610557 kernel: Failed to create system directory nfs Jul 10 00:24:02.610582 kernel: Failed to create system directory nfs Jul 10 00:24:02.601000 audit[2934]: AVC avc: denied { confidentiality } for pid=2934 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:24:02.601000 audit[2934]: AVC avc: denied { confidentiality } for pid=2934 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:24:02.601000 audit[2934]: AVC avc: denied { confidentiality } for pid=2934 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:24:02.611843 kernel: Failed to create system directory nfs Jul 10 00:24:02.611875 kernel: Failed to create system directory nfs Jul 10 00:24:02.611889 kernel: Failed to create system directory nfs Jul 10 00:24:02.601000 audit[2934]: AVC avc: denied { confidentiality } for pid=2934 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:24:02.601000 audit[2934]: AVC avc: denied { confidentiality } for pid=2934 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:24:02.612670 kernel: Failed to create system directory nfs Jul 10 00:24:02.612709 kernel: Failed to create system directory nfs Jul 10 00:24:02.601000 audit[2934]: AVC avc: denied { confidentiality } for pid=2934 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:24:02.601000 audit[2934]: AVC avc: denied { confidentiality } for pid=2934 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:24:02.613522 kernel: Failed to create system directory nfs Jul 10 00:24:02.613548 kernel: Failed to create system directory nfs Jul 10 00:24:02.601000 audit[2934]: AVC avc: denied { confidentiality } for pid=2934 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:24:02.601000 audit[2934]: AVC avc: denied { confidentiality } for pid=2934 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:24:02.601000 audit[2934]: AVC avc: denied { confidentiality } for pid=2934 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:24:02.614801 kernel: Failed to create system directory nfs Jul 10 00:24:02.614826 kernel: Failed to create system directory nfs Jul 10 00:24:02.614840 kernel: Failed to create system directory nfs Jul 10 00:24:02.601000 audit[2934]: AVC avc: denied { confidentiality } for pid=2934 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:24:02.601000 audit[2934]: AVC avc: denied { confidentiality } for pid=2934 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:24:02.615621 kernel: Failed to create system directory nfs Jul 10 00:24:02.615648 kernel: Failed to create system directory nfs Jul 10 00:24:02.601000 audit[2934]: AVC avc: denied { confidentiality } for pid=2934 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:24:02.601000 audit[2934]: AVC avc: denied { confidentiality } for pid=2934 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:24:02.601000 audit[2934]: AVC avc: denied { confidentiality } for pid=2934 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:24:02.617035 kernel: Failed to create system directory nfs Jul 10 00:24:02.617093 kernel: Failed to create system directory nfs Jul 10 00:24:02.617117 kernel: Failed to create system directory nfs Jul 10 00:24:02.601000 audit[2934]: AVC avc: denied { confidentiality } for pid=2934 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:24:02.601000 audit[2934]: AVC avc: denied { confidentiality } for pid=2934 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:24:02.617835 kernel: Failed to create system directory nfs Jul 10 00:24:02.617874 kernel: Failed to create system directory nfs Jul 10 00:24:02.601000 audit[2934]: AVC avc: denied { confidentiality } for pid=2934 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:24:02.601000 audit[2934]: AVC avc: denied { confidentiality } for pid=2934 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:24:02.618634 kernel: Failed to create system directory nfs Jul 10 00:24:02.618674 kernel: Failed to create system directory nfs Jul 10 00:24:02.601000 audit[2934]: AVC avc: denied { confidentiality } for pid=2934 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:24:02.601000 audit[2934]: AVC avc: denied { confidentiality } for pid=2934 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:24:02.619548 kernel: Failed to create system directory nfs Jul 10 00:24:02.619591 kernel: Failed to create system directory nfs Jul 10 00:24:02.601000 audit[2934]: AVC avc: denied { confidentiality } for pid=2934 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:24:02.601000 audit[2934]: AVC avc: denied { confidentiality } for pid=2934 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:24:02.601000 audit[2934]: AVC avc: denied { confidentiality } for pid=2934 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:24:02.620736 kernel: Failed to create system directory nfs Jul 10 00:24:02.620774 kernel: Failed to create system directory nfs Jul 10 00:24:02.620797 kernel: Failed to create system directory nfs Jul 10 00:24:02.601000 audit[2934]: AVC avc: denied { confidentiality } for pid=2934 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:24:02.601000 audit[2934]: AVC avc: denied { confidentiality } for pid=2934 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:24:02.621622 kernel: Failed to create system directory nfs Jul 10 00:24:02.621643 kernel: Failed to create system directory nfs Jul 10 00:24:02.601000 audit[2934]: AVC avc: denied { confidentiality } for pid=2934 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:24:02.601000 audit[2934]: AVC avc: denied { confidentiality } for pid=2934 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:24:02.622455 kernel: Failed to create system directory nfs Jul 10 00:24:02.622476 kernel: Failed to create system directory nfs Jul 10 00:24:02.601000 audit[2934]: AVC avc: denied { confidentiality } for pid=2934 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:24:02.601000 audit[2934]: AVC avc: denied { confidentiality } for pid=2934 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:24:02.601000 audit[2934]: AVC avc: denied { confidentiality } for pid=2934 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:24:02.623707 kernel: Failed to create system directory nfs Jul 10 00:24:02.623736 kernel: Failed to create system directory nfs Jul 10 00:24:02.623750 kernel: Failed to create system directory nfs Jul 10 00:24:02.601000 audit[2934]: AVC avc: denied { confidentiality } for pid=2934 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:24:02.601000 audit[2934]: AVC avc: denied { confidentiality } for pid=2934 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:24:02.624500 kernel: Failed to create system directory nfs Jul 10 00:24:02.624540 kernel: Failed to create system directory nfs Jul 10 00:24:02.601000 audit[2934]: AVC avc: denied { confidentiality } for pid=2934 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:24:02.601000 audit[2934]: AVC avc: denied { confidentiality } for pid=2934 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:24:02.625454 kernel: Failed to create system directory nfs Jul 10 00:24:02.625523 kernel: Failed to create system directory nfs Jul 10 00:24:02.601000 audit[2934]: AVC avc: denied { confidentiality } for pid=2934 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:24:02.601000 audit[2934]: AVC avc: denied { confidentiality } for pid=2934 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:24:02.601000 audit[2934]: AVC avc: denied { confidentiality } for pid=2934 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:24:02.626685 kernel: Failed to create system directory nfs Jul 10 00:24:02.626724 kernel: Failed to create system directory nfs Jul 10 00:24:02.626743 kernel: Failed to create system directory nfs Jul 10 00:24:02.601000 audit[2934]: AVC avc: denied { confidentiality } for pid=2934 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:24:02.601000 audit[2934]: AVC avc: denied { confidentiality } for pid=2934 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:24:02.627512 kernel: Failed to create system directory nfs Jul 10 00:24:02.627540 kernel: Failed to create system directory nfs Jul 10 00:24:02.601000 audit[2934]: AVC avc: denied { confidentiality } for pid=2934 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:24:02.601000 audit[2934]: AVC avc: denied { confidentiality } for pid=2934 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:24:02.601000 audit[2934]: AVC avc: denied { confidentiality } for pid=2934 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:24:02.628756 kernel: Failed to create system directory nfs Jul 10 00:24:02.628790 kernel: Failed to create system directory nfs Jul 10 00:24:02.628804 kernel: Failed to create system directory nfs Jul 10 00:24:02.601000 audit[2934]: AVC avc: denied { confidentiality } for pid=2934 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:24:02.601000 audit[2934]: AVC avc: denied { confidentiality } for pid=2934 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:24:02.629584 kernel: Failed to create system directory nfs Jul 10 00:24:02.629612 kernel: Failed to create system directory nfs Jul 10 00:24:02.601000 audit[2934]: AVC avc: denied { confidentiality } for pid=2934 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:24:02.601000 audit[2934]: AVC avc: denied { confidentiality } for pid=2934 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:24:02.601000 audit[2934]: AVC avc: denied { confidentiality } for pid=2934 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:24:02.631615 kernel: Failed to create system directory nfs Jul 10 00:24:02.631664 kernel: Failed to create system directory nfs Jul 10 00:24:02.631687 kernel: Failed to create system directory nfs Jul 10 00:24:02.601000 audit[2934]: AVC avc: denied { confidentiality } for pid=2934 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:24:02.601000 audit[2934]: AVC avc: denied { confidentiality } for pid=2934 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:24:02.632587 kernel: Failed to create system directory nfs Jul 10 00:24:02.632624 kernel: Failed to create system directory nfs Jul 10 00:24:02.601000 audit[2934]: AVC avc: denied { confidentiality } for pid=2934 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:24:02.601000 audit[2934]: AVC avc: denied { confidentiality } for pid=2934 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:24:02.633585 kernel: Failed to create system directory nfs Jul 10 00:24:02.633617 kernel: Failed to create system directory nfs Jul 10 00:24:02.601000 audit[2934]: AVC avc: denied { confidentiality } for pid=2934 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:24:02.601000 audit[2934]: AVC avc: denied { confidentiality } for pid=2934 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:24:02.634685 kernel: Failed to create system directory nfs Jul 10 00:24:02.652835 kernel: FS-Cache: Netfs 'nfs' registered for caching Jul 10 00:24:02.601000 audit[2934]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=aaaae8ad2a40 a1=116364 a2=aaaadd18e028 a3=aaaae86bb010 items=0 ppid=647 pid=2934 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:24:02.601000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Jul 10 00:24:02.674000 audit[2940]: AVC avc: denied { confidentiality } for pid=2940 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:24:02.674000 audit[2940]: AVC avc: denied { confidentiality } for pid=2940 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:24:02.683737 kernel: Failed to create system directory nfs4 Jul 10 00:24:02.683784 kernel: Failed to create system directory nfs4 Jul 10 00:24:02.683800 kernel: Failed to create system directory nfs4 Jul 10 00:24:02.674000 audit[2940]: AVC avc: denied { confidentiality } for pid=2940 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:24:02.674000 audit[2940]: AVC avc: denied { confidentiality } for pid=2940 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:24:02.684861 kernel: Failed to create system directory nfs4 Jul 10 00:24:02.684899 kernel: Failed to create system directory nfs4 Jul 10 00:24:02.674000 audit[2940]: AVC avc: denied { confidentiality } for pid=2940 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:24:02.674000 audit[2940]: AVC avc: denied { confidentiality } for pid=2940 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:24:02.685481 kernel: Failed to create system directory nfs4 Jul 10 00:24:02.674000 audit[2940]: AVC avc: denied { confidentiality } for pid=2940 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:24:02.686580 kernel: Failed to create system directory nfs4 Jul 10 00:24:02.686610 kernel: Failed to create system directory nfs4 Jul 10 00:24:02.674000 audit[2940]: AVC avc: denied { confidentiality } for pid=2940 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:24:02.674000 audit[2940]: AVC avc: denied { confidentiality } for pid=2940 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:24:02.687706 kernel: Failed to create system directory nfs4 Jul 10 00:24:02.687841 kernel: Failed to create system directory nfs4 Jul 10 00:24:02.674000 audit[2940]: AVC avc: denied { confidentiality } for pid=2940 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:24:02.688465 kernel: Failed to create system directory nfs4 Jul 10 00:24:02.674000 audit[2940]: AVC avc: denied { confidentiality } for pid=2940 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:24:02.674000 audit[2940]: AVC avc: denied { confidentiality } for pid=2940 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:24:02.689694 kernel: Failed to create system directory nfs4 Jul 10 00:24:02.689736 kernel: Failed to create system directory nfs4 Jul 10 00:24:02.674000 audit[2940]: AVC avc: denied { confidentiality } for pid=2940 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:24:02.674000 audit[2940]: AVC avc: denied { confidentiality } for pid=2940 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:24:02.690797 kernel: Failed to create system directory nfs4 Jul 10 00:24:02.690827 kernel: Failed to create system directory nfs4 Jul 10 00:24:02.690841 kernel: Failed to create system directory nfs4 Jul 10 00:24:02.674000 audit[2940]: AVC avc: denied { confidentiality } for pid=2940 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:24:02.674000 audit[2940]: AVC avc: denied { confidentiality } for pid=2940 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:24:02.674000 audit[2940]: AVC avc: denied { confidentiality } for pid=2940 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:24:02.691751 kernel: Failed to create system directory nfs4 Jul 10 00:24:02.674000 audit[2940]: AVC avc: denied { confidentiality } for pid=2940 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:24:02.674000 audit[2940]: AVC avc: denied { confidentiality } for pid=2940 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:24:02.692687 kernel: Failed to create system directory nfs4 Jul 10 00:24:02.692705 kernel: Failed to create system directory nfs4 Jul 10 00:24:02.692728 kernel: Failed to create system directory nfs4 Jul 10 00:24:02.674000 audit[2940]: AVC avc: denied { confidentiality } for pid=2940 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:24:02.674000 audit[2940]: AVC avc: denied { confidentiality } for pid=2940 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:24:02.693523 kernel: Failed to create system directory nfs4 Jul 10 00:24:02.674000 audit[2940]: AVC avc: denied { confidentiality } for pid=2940 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:24:02.674000 audit[2940]: AVC avc: denied { confidentiality } for pid=2940 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:24:02.674000 audit[2940]: AVC avc: denied { confidentiality } for pid=2940 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:24:02.694839 kernel: Failed to create system directory nfs4 Jul 10 00:24:02.694858 kernel: Failed to create system directory nfs4 Jul 10 00:24:02.694871 kernel: Failed to create system directory nfs4 Jul 10 00:24:02.694884 kernel: Failed to create system directory nfs4 Jul 10 00:24:02.674000 audit[2940]: AVC avc: denied { confidentiality } for pid=2940 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:24:02.674000 audit[2940]: AVC avc: denied { confidentiality } for pid=2940 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:24:02.695716 kernel: Failed to create system directory nfs4 Jul 10 00:24:02.695741 kernel: Failed to create system directory nfs4 Jul 10 00:24:02.674000 audit[2940]: AVC avc: denied { confidentiality } for pid=2940 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:24:02.674000 audit[2940]: AVC avc: denied { confidentiality } for pid=2940 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:24:02.696549 kernel: Failed to create system directory nfs4 Jul 10 00:24:02.696587 kernel: Failed to create system directory nfs4 Jul 10 00:24:02.674000 audit[2940]: AVC avc: denied { confidentiality } for pid=2940 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:24:02.674000 audit[2940]: AVC avc: denied { confidentiality } for pid=2940 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:24:02.674000 audit[2940]: AVC avc: denied { confidentiality } for pid=2940 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:24:02.697913 kernel: Failed to create system directory nfs4 Jul 10 00:24:02.697968 kernel: Failed to create system directory nfs4 Jul 10 00:24:02.697988 kernel: Failed to create system directory nfs4 Jul 10 00:24:02.674000 audit[2940]: AVC avc: denied { confidentiality } for pid=2940 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:24:02.674000 audit[2940]: AVC avc: denied { confidentiality } for pid=2940 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:24:02.698683 kernel: Failed to create system directory nfs4 Jul 10 00:24:02.698705 kernel: Failed to create system directory nfs4 Jul 10 00:24:02.674000 audit[2940]: AVC avc: denied { confidentiality } for pid=2940 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:24:02.674000 audit[2940]: AVC avc: denied { confidentiality } for pid=2940 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:24:02.699583 kernel: Failed to create system directory nfs4 Jul 10 00:24:02.699622 kernel: Failed to create system directory nfs4 Jul 10 00:24:02.674000 audit[2940]: AVC avc: denied { confidentiality } for pid=2940 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:24:02.674000 audit[2940]: AVC avc: denied { confidentiality } for pid=2940 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:24:02.674000 audit[2940]: AVC avc: denied { confidentiality } for pid=2940 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:24:02.700969 kernel: Failed to create system directory nfs4 Jul 10 00:24:02.701016 kernel: Failed to create system directory nfs4 Jul 10 00:24:02.701216 kernel: Failed to create system directory nfs4 Jul 10 00:24:02.674000 audit[2940]: AVC avc: denied { confidentiality } for pid=2940 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:24:02.674000 audit[2940]: AVC avc: denied { confidentiality } for pid=2940 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:24:02.701788 kernel: Failed to create system directory nfs4 Jul 10 00:24:02.701830 kernel: Failed to create system directory nfs4 Jul 10 00:24:02.674000 audit[2940]: AVC avc: denied { confidentiality } for pid=2940 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:24:02.674000 audit[2940]: AVC avc: denied { confidentiality } for pid=2940 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:24:02.702691 kernel: Failed to create system directory nfs4 Jul 10 00:24:02.702734 kernel: Failed to create system directory nfs4 Jul 10 00:24:02.674000 audit[2940]: AVC avc: denied { confidentiality } for pid=2940 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:24:02.674000 audit[2940]: AVC avc: denied { confidentiality } for pid=2940 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:24:02.703620 kernel: Failed to create system directory nfs4 Jul 10 00:24:02.703668 kernel: Failed to create system directory nfs4 Jul 10 00:24:02.674000 audit[2940]: AVC avc: denied { confidentiality } for pid=2940 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:24:02.674000 audit[2940]: AVC avc: denied { confidentiality } for pid=2940 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:24:02.704584 kernel: Failed to create system directory nfs4 Jul 10 00:24:02.704613 kernel: Failed to create system directory nfs4 Jul 10 00:24:02.674000 audit[2940]: AVC avc: denied { confidentiality } for pid=2940 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:24:02.674000 audit[2940]: AVC avc: denied { confidentiality } for pid=2940 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:24:02.705515 kernel: Failed to create system directory nfs4 Jul 10 00:24:02.705542 kernel: Failed to create system directory nfs4 Jul 10 00:24:02.674000 audit[2940]: AVC avc: denied { confidentiality } for pid=2940 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:24:02.674000 audit[2940]: AVC avc: denied { confidentiality } for pid=2940 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:24:02.706466 kernel: Failed to create system directory nfs4 Jul 10 00:24:02.706505 kernel: Failed to create system directory nfs4 Jul 10 00:24:02.674000 audit[2940]: AVC avc: denied { confidentiality } for pid=2940 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:24:02.674000 audit[2940]: AVC avc: denied { confidentiality } for pid=2940 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:24:02.674000 audit[2940]: AVC avc: denied { confidentiality } for pid=2940 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:24:02.707817 kernel: Failed to create system directory nfs4 Jul 10 00:24:02.707842 kernel: Failed to create system directory nfs4 Jul 10 00:24:02.674000 audit[2940]: AVC avc: denied { confidentiality } for pid=2940 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:24:02.674000 audit[2940]: AVC avc: denied { confidentiality } for pid=2940 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:24:02.708765 kernel: Failed to create system directory nfs4 Jul 10 00:24:02.708787 kernel: Failed to create system directory nfs4 Jul 10 00:24:02.708801 kernel: Failed to create system directory nfs4 Jul 10 00:24:02.674000 audit[2940]: AVC avc: denied { confidentiality } for pid=2940 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:24:02.717725 kernel: Failed to create system directory nfs4 Jul 10 00:24:02.717822 kernel: Failed to create system directory nfs4 Jul 10 00:24:02.717838 kernel: Failed to create system directory nfs4 Jul 10 00:24:02.717873 kernel: Failed to create system directory nfs4 Jul 10 00:24:02.717888 kernel: Failed to create system directory nfs4 Jul 10 00:24:02.717903 kernel: Failed to create system directory nfs4 Jul 10 00:24:02.717916 kernel: Failed to create system directory nfs4 Jul 10 00:24:02.717940 kernel: Failed to create system directory nfs4 Jul 10 00:24:02.717959 kernel: Failed to create system directory nfs4 Jul 10 00:24:02.717974 kernel: Failed to create system directory nfs4 Jul 10 00:24:02.717994 kernel: Failed to create system directory nfs4 Jul 10 00:24:02.718023 kernel: Failed to create system directory nfs4 Jul 10 00:24:02.718037 kernel: Failed to create system directory nfs4 Jul 10 00:24:02.674000 audit[2940]: AVC avc: denied { confidentiality } for pid=2940 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:24:02.674000 audit[2940]: AVC avc: denied { confidentiality } for pid=2940 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:24:02.674000 audit[2940]: AVC avc: denied { confidentiality } for pid=2940 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:24:02.674000 audit[2940]: AVC avc: denied { confidentiality } for pid=2940 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:24:02.674000 audit[2940]: AVC avc: denied { confidentiality } for pid=2940 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:24:02.674000 audit[2940]: AVC avc: denied { confidentiality } for pid=2940 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:24:02.674000 audit[2940]: AVC avc: denied { confidentiality } for pid=2940 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:24:02.674000 audit[2940]: AVC avc: denied { confidentiality } for pid=2940 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:24:02.674000 audit[2940]: AVC avc: denied { confidentiality } for pid=2940 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:24:02.674000 audit[2940]: AVC avc: denied { confidentiality } for pid=2940 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:24:02.674000 audit[2940]: AVC avc: denied { confidentiality } for pid=2940 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:24:02.674000 audit[2940]: AVC avc: denied { confidentiality } for pid=2940 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:24:02.674000 audit[2940]: AVC avc: denied { confidentiality } for pid=2940 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:24:02.720183 kernel: Failed to create system directory nfs4 Jul 10 00:24:02.720226 kernel: Failed to create system directory nfs4 Jul 10 00:24:02.720267 kernel: Failed to create system directory nfs4 Jul 10 00:24:02.721716 kernel: Failed to create system directory nfs4 Jul 10 00:24:02.721748 kernel: Failed to create system directory nfs4 Jul 10 00:24:02.674000 audit[2940]: AVC avc: denied { confidentiality } for pid=2940 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:24:02.674000 audit[2940]: AVC avc: denied { confidentiality } for pid=2940 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:24:02.674000 audit[2940]: AVC avc: denied { confidentiality } for pid=2940 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:24:02.674000 audit[2940]: AVC avc: denied { confidentiality } for pid=2940 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:24:02.674000 audit[2940]: AVC avc: denied { confidentiality } for pid=2940 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:24:02.674000 audit[2940]: AVC avc: denied { confidentiality } for pid=2940 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:24:02.722793 kernel: Failed to create system directory nfs4 Jul 10 00:24:02.722816 kernel: Failed to create system directory nfs4 Jul 10 00:24:02.674000 audit[2940]: AVC avc: denied { confidentiality } for pid=2940 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:24:02.674000 audit[2940]: AVC avc: denied { confidentiality } for pid=2940 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:24:02.723767 kernel: Failed to create system directory nfs4 Jul 10 00:24:02.723807 kernel: Failed to create system directory nfs4 Jul 10 00:24:02.674000 audit[2940]: AVC avc: denied { confidentiality } for pid=2940 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:24:02.674000 audit[2940]: AVC avc: denied { confidentiality } for pid=2940 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:24:02.725455 kernel: Failed to create system directory nfs4 Jul 10 00:24:02.725494 kernel: Failed to create system directory nfs4 Jul 10 00:24:02.674000 audit[2940]: AVC avc: denied { confidentiality } for pid=2940 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:24:02.674000 audit[2940]: AVC avc: denied { confidentiality } for pid=2940 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:24:02.726496 kernel: Failed to create system directory nfs4 Jul 10 00:24:02.726523 kernel: Failed to create system directory nfs4 Jul 10 00:24:02.674000 audit[2940]: AVC avc: denied { confidentiality } for pid=2940 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:24:02.674000 audit[2940]: AVC avc: denied { confidentiality } for pid=2940 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:24:02.674000 audit[2940]: AVC avc: denied { confidentiality } for pid=2940 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:24:02.727848 kernel: Failed to create system directory nfs4 Jul 10 00:24:02.727870 kernel: Failed to create system directory nfs4 Jul 10 00:24:02.727898 kernel: Failed to create system directory nfs4 Jul 10 00:24:02.674000 audit[2940]: AVC avc: denied { confidentiality } for pid=2940 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:24:02.674000 audit[2940]: AVC avc: denied { confidentiality } for pid=2940 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:24:02.728803 kernel: Failed to create system directory nfs4 Jul 10 00:24:02.728825 kernel: Failed to create system directory nfs4 Jul 10 00:24:02.674000 audit[2940]: AVC avc: denied { confidentiality } for pid=2940 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:24:02.674000 audit[2940]: AVC avc: denied { confidentiality } for pid=2940 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:24:02.729705 kernel: Failed to create system directory nfs4 Jul 10 00:24:02.729728 kernel: Failed to create system directory nfs4 Jul 10 00:24:02.674000 audit[2940]: AVC avc: denied { confidentiality } for pid=2940 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:24:02.674000 audit[2940]: AVC avc: denied { confidentiality } for pid=2940 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:24:02.730552 kernel: Failed to create system directory nfs4 Jul 10 00:24:02.674000 audit[2940]: AVC avc: denied { confidentiality } for pid=2940 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:24:02.674000 audit[2940]: AVC avc: denied { confidentiality } for pid=2940 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:24:02.731453 kernel: Failed to create system directory nfs4 Jul 10 00:24:02.731470 kernel: Failed to create system directory nfs4 Jul 10 00:24:02.731484 kernel: Failed to create system directory nfs4 Jul 10 00:24:02.674000 audit[2940]: AVC avc: denied { confidentiality } for pid=2940 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:24:02.674000 audit[2940]: AVC avc: denied { confidentiality } for pid=2940 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:24:02.732459 kernel: Failed to create system directory nfs4 Jul 10 00:24:02.804616 kubelet[1455]: E0710 00:24:02.804556 1455 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 00:24:02.832628 kernel: NFS: Registering the id_resolver key type Jul 10 00:24:02.832721 kernel: Key type id_resolver registered Jul 10 00:24:02.832755 kernel: Key type id_legacy registered Jul 10 00:24:02.674000 audit[2940]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=ffff8132a010 a1=19c79c a2=aaaab560e028 a3=aaaae0e75010 items=0 ppid=647 pid=2940 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:24:02.674000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D006E66737634 Jul 10 00:24:02.842000 audit[2941]: AVC avc: denied { confidentiality } for pid=2941 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:24:02.846678 kernel: Failed to create system directory rpcgss Jul 10 00:24:02.846746 kernel: Failed to create system directory rpcgss Jul 10 00:24:02.842000 audit[2941]: AVC avc: denied { confidentiality } for pid=2941 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:24:02.842000 audit[2941]: AVC avc: denied { confidentiality } for pid=2941 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:24:02.847459 kernel: Failed to create system directory rpcgss Jul 10 00:24:02.842000 audit[2941]: AVC avc: denied { confidentiality } for pid=2941 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:24:02.848505 kernel: Failed to create system directory rpcgss Jul 10 00:24:02.848534 kernel: Failed to create system directory rpcgss Jul 10 00:24:02.842000 audit[2941]: AVC avc: denied { confidentiality } for pid=2941 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:24:02.842000 audit[2941]: AVC avc: denied { confidentiality } for pid=2941 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:24:02.849568 kernel: Failed to create system directory rpcgss Jul 10 00:24:02.849595 kernel: Failed to create system directory rpcgss Jul 10 00:24:02.842000 audit[2941]: AVC avc: denied { confidentiality } for pid=2941 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:24:02.842000 audit[2941]: AVC avc: denied { confidentiality } for pid=2941 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:24:02.850639 kernel: Failed to create system directory rpcgss Jul 10 00:24:02.850668 kernel: Failed to create system directory rpcgss Jul 10 00:24:02.842000 audit[2941]: AVC avc: denied { confidentiality } for pid=2941 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:24:02.842000 audit[2941]: AVC avc: denied { confidentiality } for pid=2941 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:24:02.851714 kernel: Failed to create system directory rpcgss Jul 10 00:24:02.851742 kernel: Failed to create system directory rpcgss Jul 10 00:24:02.842000 audit[2941]: AVC avc: denied { confidentiality } for pid=2941 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:24:02.842000 audit[2941]: AVC avc: denied { confidentiality } for pid=2941 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:24:02.852780 kernel: Failed to create system directory rpcgss Jul 10 00:24:02.852808 kernel: Failed to create system directory rpcgss Jul 10 00:24:02.842000 audit[2941]: AVC avc: denied { confidentiality } for pid=2941 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:24:02.842000 audit[2941]: AVC avc: denied { confidentiality } for pid=2941 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:24:02.853456 kernel: Failed to create system directory rpcgss Jul 10 00:24:02.842000 audit[2941]: AVC avc: denied { confidentiality } for pid=2941 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:24:02.854458 kernel: Failed to create system directory rpcgss Jul 10 00:24:02.854486 kernel: Failed to create system directory rpcgss Jul 10 00:24:02.842000 audit[2941]: AVC avc: denied { confidentiality } for pid=2941 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:24:02.842000 audit[2941]: AVC avc: denied { confidentiality } for pid=2941 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:24:02.856902 kernel: Failed to create system directory rpcgss Jul 10 00:24:02.856953 kernel: Failed to create system directory rpcgss Jul 10 00:24:02.842000 audit[2941]: AVC avc: denied { confidentiality } for pid=2941 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:24:02.857511 kernel: Failed to create system directory rpcgss Jul 10 00:24:02.842000 audit[2941]: AVC avc: denied { confidentiality } for pid=2941 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:24:02.842000 audit[2941]: AVC avc: denied { confidentiality } for pid=2941 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:24:02.858618 kernel: Failed to create system directory rpcgss Jul 10 00:24:02.858647 kernel: Failed to create system directory rpcgss Jul 10 00:24:02.842000 audit[2941]: AVC avc: denied { confidentiality } for pid=2941 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:24:02.842000 audit[2941]: AVC avc: denied { confidentiality } for pid=2941 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:24:02.859664 kernel: Failed to create system directory rpcgss Jul 10 00:24:02.859696 kernel: Failed to create system directory rpcgss Jul 10 00:24:02.842000 audit[2941]: AVC avc: denied { confidentiality } for pid=2941 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:24:02.842000 audit[2941]: AVC avc: denied { confidentiality } for pid=2941 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:24:02.860734 kernel: Failed to create system directory rpcgss Jul 10 00:24:02.860764 kernel: Failed to create system directory rpcgss Jul 10 00:24:02.842000 audit[2941]: AVC avc: denied { confidentiality } for pid=2941 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:24:02.842000 audit[2941]: AVC avc: denied { confidentiality } for pid=2941 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:24:02.861455 kernel: Failed to create system directory rpcgss Jul 10 00:24:02.842000 audit[2941]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=ffffa63d2010 a1=5ee94 a2=aaaacd52e028 a3=aaaada389010 items=0 ppid=647 pid=2941 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:24:02.842000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D007270632D617574682D36 Jul 10 00:24:02.884584 nfsidmap[2950]: nss_getpwnam: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain 'localdomain' Jul 10 00:24:02.887781 nfsidmap[2953]: nss_name_to_gid: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain 'localdomain' Jul 10 00:24:02.904000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2494 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Jul 10 00:24:02.904000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2494 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Jul 10 00:24:02.904000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2494 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Jul 10 00:24:02.904000 audit[1284]: AVC avc: denied { watch_reads } for pid=1284 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2494 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Jul 10 00:24:02.904000 audit[1284]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=e a1=aaaaebfabbd0 a2=10 a3=0 items=0 ppid=1 pid=1284 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:24:02.904000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Jul 10 00:24:02.904000 audit[1284]: AVC avc: denied { watch_reads } for pid=1284 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2494 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Jul 10 00:24:02.904000 audit[1284]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=e a1=aaaaebfabbd0 a2=10 a3=0 items=0 ppid=1 pid=1284 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:24:02.904000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Jul 10 00:24:02.904000 audit[1284]: AVC avc: denied { watch_reads } for pid=1284 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2494 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Jul 10 00:24:02.904000 audit[1284]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=e a1=aaaaebfabbd0 a2=10 a3=0 items=0 ppid=1 pid=1284 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:24:02.904000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Jul 10 00:24:03.076940 env[1217]: time="2025-07-10T00:24:03.076885830Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:97560c8d-bc12-473b-9222-73619d2d473c,Namespace:default,Attempt:0,}" Jul 10 00:24:03.192959 systemd-networkd[1044]: cali5ec59c6bf6e: Link UP Jul 10 00:24:03.195839 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Jul 10 00:24:03.195929 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali5ec59c6bf6e: link becomes ready Jul 10 00:24:03.195953 systemd-networkd[1044]: cali5ec59c6bf6e: Gained carrier Jul 10 00:24:03.204206 env[1217]: 2025-07-10 00:24:03.119 [INFO][2957] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.0.0.22-k8s-test--pod--1-eth0 default 97560c8d-bc12-473b-9222-73619d2d473c 1343 0 2025-07-10 00:23:48 +0000 UTC map[projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 10.0.0.22 test-pod-1 eth0 default [] [] [kns.default ksa.default.default] cali5ec59c6bf6e [] [] }} ContainerID="c2d4de28e924250c2bfe22c2ab3669c0588af6be9024ce55bd1b370f435f6ac2" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.22-k8s-test--pod--1-" Jul 10 00:24:03.204206 env[1217]: 2025-07-10 00:24:03.119 [INFO][2957] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="c2d4de28e924250c2bfe22c2ab3669c0588af6be9024ce55bd1b370f435f6ac2" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.22-k8s-test--pod--1-eth0" Jul 10 00:24:03.204206 env[1217]: 2025-07-10 00:24:03.146 [INFO][2971] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="c2d4de28e924250c2bfe22c2ab3669c0588af6be9024ce55bd1b370f435f6ac2" HandleID="k8s-pod-network.c2d4de28e924250c2bfe22c2ab3669c0588af6be9024ce55bd1b370f435f6ac2" Workload="10.0.0.22-k8s-test--pod--1-eth0" Jul 10 00:24:03.204206 env[1217]: 2025-07-10 00:24:03.146 [INFO][2971] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="c2d4de28e924250c2bfe22c2ab3669c0588af6be9024ce55bd1b370f435f6ac2" HandleID="k8s-pod-network.c2d4de28e924250c2bfe22c2ab3669c0588af6be9024ce55bd1b370f435f6ac2" Workload="10.0.0.22-k8s-test--pod--1-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x400004c760), Attrs:map[string]string{"namespace":"default", "node":"10.0.0.22", "pod":"test-pod-1", "timestamp":"2025-07-10 00:24:03.146130316 +0000 UTC"}, Hostname:"10.0.0.22", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Jul 10 00:24:03.204206 env[1217]: 2025-07-10 00:24:03.146 [INFO][2971] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Jul 10 00:24:03.204206 env[1217]: 2025-07-10 00:24:03.146 [INFO][2971] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Jul 10 00:24:03.204206 env[1217]: 2025-07-10 00:24:03.146 [INFO][2971] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.0.0.22' Jul 10 00:24:03.204206 env[1217]: 2025-07-10 00:24:03.159 [INFO][2971] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.c2d4de28e924250c2bfe22c2ab3669c0588af6be9024ce55bd1b370f435f6ac2" host="10.0.0.22" Jul 10 00:24:03.204206 env[1217]: 2025-07-10 00:24:03.164 [INFO][2971] ipam/ipam.go 394: Looking up existing affinities for host host="10.0.0.22" Jul 10 00:24:03.204206 env[1217]: 2025-07-10 00:24:03.170 [INFO][2971] ipam/ipam.go 511: Trying affinity for 192.168.12.192/26 host="10.0.0.22" Jul 10 00:24:03.204206 env[1217]: 2025-07-10 00:24:03.171 [INFO][2971] ipam/ipam.go 158: Attempting to load block cidr=192.168.12.192/26 host="10.0.0.22" Jul 10 00:24:03.204206 env[1217]: 2025-07-10 00:24:03.176 [INFO][2971] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.12.192/26 host="10.0.0.22" Jul 10 00:24:03.204206 env[1217]: 2025-07-10 00:24:03.176 [INFO][2971] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.12.192/26 handle="k8s-pod-network.c2d4de28e924250c2bfe22c2ab3669c0588af6be9024ce55bd1b370f435f6ac2" host="10.0.0.22" Jul 10 00:24:03.204206 env[1217]: 2025-07-10 00:24:03.180 [INFO][2971] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.c2d4de28e924250c2bfe22c2ab3669c0588af6be9024ce55bd1b370f435f6ac2 Jul 10 00:24:03.204206 env[1217]: 2025-07-10 00:24:03.183 [INFO][2971] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.12.192/26 handle="k8s-pod-network.c2d4de28e924250c2bfe22c2ab3669c0588af6be9024ce55bd1b370f435f6ac2" host="10.0.0.22" Jul 10 00:24:03.204206 env[1217]: 2025-07-10 00:24:03.189 [INFO][2971] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.12.196/26] block=192.168.12.192/26 handle="k8s-pod-network.c2d4de28e924250c2bfe22c2ab3669c0588af6be9024ce55bd1b370f435f6ac2" host="10.0.0.22" Jul 10 00:24:03.204206 env[1217]: 2025-07-10 00:24:03.189 [INFO][2971] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.12.196/26] handle="k8s-pod-network.c2d4de28e924250c2bfe22c2ab3669c0588af6be9024ce55bd1b370f435f6ac2" host="10.0.0.22" Jul 10 00:24:03.204206 env[1217]: 2025-07-10 00:24:03.189 [INFO][2971] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Jul 10 00:24:03.204206 env[1217]: 2025-07-10 00:24:03.189 [INFO][2971] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.12.196/26] IPv6=[] ContainerID="c2d4de28e924250c2bfe22c2ab3669c0588af6be9024ce55bd1b370f435f6ac2" HandleID="k8s-pod-network.c2d4de28e924250c2bfe22c2ab3669c0588af6be9024ce55bd1b370f435f6ac2" Workload="10.0.0.22-k8s-test--pod--1-eth0" Jul 10 00:24:03.204206 env[1217]: 2025-07-10 00:24:03.191 [INFO][2957] cni-plugin/k8s.go 418: Populated endpoint ContainerID="c2d4de28e924250c2bfe22c2ab3669c0588af6be9024ce55bd1b370f435f6ac2" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.22-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.22-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"97560c8d-bc12-473b-9222-73619d2d473c", ResourceVersion:"1343", Generation:0, CreationTimestamp:time.Date(2025, time.July, 10, 0, 23, 48, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.22", ContainerID:"", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.12.196/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Jul 10 00:24:03.204864 env[1217]: 2025-07-10 00:24:03.191 [INFO][2957] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.12.196/32] ContainerID="c2d4de28e924250c2bfe22c2ab3669c0588af6be9024ce55bd1b370f435f6ac2" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.22-k8s-test--pod--1-eth0" Jul 10 00:24:03.204864 env[1217]: 2025-07-10 00:24:03.191 [INFO][2957] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali5ec59c6bf6e ContainerID="c2d4de28e924250c2bfe22c2ab3669c0588af6be9024ce55bd1b370f435f6ac2" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.22-k8s-test--pod--1-eth0" Jul 10 00:24:03.204864 env[1217]: 2025-07-10 00:24:03.193 [INFO][2957] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="c2d4de28e924250c2bfe22c2ab3669c0588af6be9024ce55bd1b370f435f6ac2" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.22-k8s-test--pod--1-eth0" Jul 10 00:24:03.204864 env[1217]: 2025-07-10 00:24:03.193 [INFO][2957] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="c2d4de28e924250c2bfe22c2ab3669c0588af6be9024ce55bd1b370f435f6ac2" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.22-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.22-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"97560c8d-bc12-473b-9222-73619d2d473c", ResourceVersion:"1343", Generation:0, CreationTimestamp:time.Date(2025, time.July, 10, 0, 23, 48, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.22", ContainerID:"c2d4de28e924250c2bfe22c2ab3669c0588af6be9024ce55bd1b370f435f6ac2", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.12.196/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"b6:76:bf:fd:6f:0b", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Jul 10 00:24:03.204864 env[1217]: 2025-07-10 00:24:03.200 [INFO][2957] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="c2d4de28e924250c2bfe22c2ab3669c0588af6be9024ce55bd1b370f435f6ac2" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.22-k8s-test--pod--1-eth0" Jul 10 00:24:03.212000 audit[2987]: NETFILTER_CFG table=filter:94 family=2 entries=40 op=nft_register_chain pid=2987 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 10 00:24:03.212000 audit[2987]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=20336 a0=3 a1=fffff07250b0 a2=0 a3=ffffa5c47fa8 items=0 ppid=2166 pid=2987 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:24:03.212000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 10 00:24:03.267178 env[1217]: time="2025-07-10T00:24:03.267086797Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 10 00:24:03.267178 env[1217]: time="2025-07-10T00:24:03.267134397Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 10 00:24:03.267178 env[1217]: time="2025-07-10T00:24:03.267144717Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 10 00:24:03.267404 env[1217]: time="2025-07-10T00:24:03.267304157Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/c2d4de28e924250c2bfe22c2ab3669c0588af6be9024ce55bd1b370f435f6ac2 pid=2996 runtime=io.containerd.runc.v2 Jul 10 00:24:03.277162 systemd[1]: Started cri-containerd-c2d4de28e924250c2bfe22c2ab3669c0588af6be9024ce55bd1b370f435f6ac2.scope. Jul 10 00:24:03.331000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:24:03.331000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:24:03.331000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:24:03.331000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:24:03.331000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:24:03.331000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:24:03.331000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:24:03.331000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:24:03.331000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:24:03.331000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:24:03.331000 audit: BPF prog-id=123 op=LOAD Jul 10 00:24:03.332000 audit[3005]: AVC avc: denied { bpf } for pid=3005 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:24:03.332000 audit[3005]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=2996 pid=3005 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:24:03.332000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6332643464653238653932343235306332626665323263326162333636 Jul 10 00:24:03.332000 audit[3005]: AVC avc: denied { perfmon } for pid=3005 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:24:03.332000 audit[3005]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2996 pid=3005 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:24:03.332000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6332643464653238653932343235306332626665323263326162333636 Jul 10 00:24:03.333000 audit[3005]: AVC avc: denied { bpf } for pid=3005 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:24:03.333000 audit[3005]: AVC avc: denied { bpf } for pid=3005 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:24:03.333000 audit[3005]: AVC avc: denied { bpf } for pid=3005 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:24:03.333000 audit[3005]: AVC avc: denied { perfmon } for pid=3005 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:24:03.333000 audit[3005]: AVC avc: denied { perfmon } for pid=3005 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:24:03.333000 audit[3005]: AVC avc: denied { perfmon } for pid=3005 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:24:03.333000 audit[3005]: AVC avc: denied { perfmon } for pid=3005 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:24:03.333000 audit[3005]: AVC avc: denied { perfmon } for pid=3005 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:24:03.333000 audit[3005]: AVC avc: denied { bpf } for pid=3005 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:24:03.333000 audit[3005]: AVC avc: denied { bpf } for pid=3005 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:24:03.333000 audit: BPF prog-id=124 op=LOAD Jul 10 00:24:03.333000 audit[3005]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=2996 pid=3005 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:24:03.333000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6332643464653238653932343235306332626665323263326162333636 Jul 10 00:24:03.333000 audit[3005]: AVC avc: denied { bpf } for pid=3005 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:24:03.333000 audit[3005]: AVC avc: denied { bpf } for pid=3005 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:24:03.333000 audit[3005]: AVC avc: denied { perfmon } for pid=3005 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:24:03.333000 audit[3005]: AVC avc: denied { perfmon } for pid=3005 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:24:03.333000 audit[3005]: AVC avc: denied { perfmon } for pid=3005 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:24:03.333000 audit[3005]: AVC avc: denied { perfmon } for pid=3005 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:24:03.333000 audit[3005]: AVC avc: denied { perfmon } for pid=3005 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:24:03.333000 audit[3005]: AVC avc: denied { bpf } for pid=3005 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:24:03.333000 audit[3005]: AVC avc: denied { bpf } for pid=3005 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:24:03.333000 audit: BPF prog-id=125 op=LOAD Jul 10 00:24:03.333000 audit[3005]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=2996 pid=3005 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:24:03.333000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6332643464653238653932343235306332626665323263326162333636 Jul 10 00:24:03.334000 audit: BPF prog-id=125 op=UNLOAD Jul 10 00:24:03.334000 audit: BPF prog-id=124 op=UNLOAD Jul 10 00:24:03.334000 audit[3005]: AVC avc: denied { bpf } for pid=3005 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:24:03.334000 audit[3005]: AVC avc: denied { bpf } for pid=3005 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:24:03.334000 audit[3005]: AVC avc: denied { bpf } for pid=3005 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:24:03.334000 audit[3005]: AVC avc: denied { perfmon } for pid=3005 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:24:03.334000 audit[3005]: AVC avc: denied { perfmon } for pid=3005 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:24:03.334000 audit[3005]: AVC avc: denied { perfmon } for pid=3005 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:24:03.334000 audit[3005]: AVC avc: denied { perfmon } for pid=3005 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:24:03.334000 audit[3005]: AVC avc: denied { perfmon } for pid=3005 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:24:03.334000 audit[3005]: AVC avc: denied { bpf } for pid=3005 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:24:03.334000 audit[3005]: AVC avc: denied { bpf } for pid=3005 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:24:03.334000 audit: BPF prog-id=126 op=LOAD Jul 10 00:24:03.334000 audit[3005]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=2996 pid=3005 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:24:03.334000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6332643464653238653932343235306332626665323263326162333636 Jul 10 00:24:03.336915 systemd-resolved[1157]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Jul 10 00:24:03.356584 env[1217]: time="2025-07-10T00:24:03.356537611Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:97560c8d-bc12-473b-9222-73619d2d473c,Namespace:default,Attempt:0,} returns sandbox id \"c2d4de28e924250c2bfe22c2ab3669c0588af6be9024ce55bd1b370f435f6ac2\"" Jul 10 00:24:03.357924 env[1217]: time="2025-07-10T00:24:03.357879568Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" Jul 10 00:24:03.586751 env[1217]: time="2025-07-10T00:24:03.586609673Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 10 00:24:03.588264 env[1217]: time="2025-07-10T00:24:03.588223630Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:cd8b38a4e22587134e82fff3512a99b84799274d989a1ec20f58c7f8c89b8511,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 10 00:24:03.590563 env[1217]: time="2025-07-10T00:24:03.590530547Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 10 00:24:03.593473 env[1217]: time="2025-07-10T00:24:03.593420102Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx@sha256:30bb68e656e0665bce700e67d2756f68bdca3345fa1099a32bfdb8febcf621cd,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 10 00:24:03.593896 env[1217]: time="2025-07-10T00:24:03.593859021Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:cd8b38a4e22587134e82fff3512a99b84799274d989a1ec20f58c7f8c89b8511\"" Jul 10 00:24:03.596965 env[1217]: time="2025-07-10T00:24:03.596922696Z" level=info msg="CreateContainer within sandbox \"c2d4de28e924250c2bfe22c2ab3669c0588af6be9024ce55bd1b370f435f6ac2\" for container &ContainerMetadata{Name:test,Attempt:0,}" Jul 10 00:24:03.609354 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1105995182.mount: Deactivated successfully. Jul 10 00:24:03.613105 env[1217]: time="2025-07-10T00:24:03.613065310Z" level=info msg="CreateContainer within sandbox \"c2d4de28e924250c2bfe22c2ab3669c0588af6be9024ce55bd1b370f435f6ac2\" for &ContainerMetadata{Name:test,Attempt:0,} returns container id \"cc79abd60a373d249f09434800e2280f8752999195e8f1885b01520b5f7677ad\"" Jul 10 00:24:03.613704 env[1217]: time="2025-07-10T00:24:03.613674469Z" level=info msg="StartContainer for \"cc79abd60a373d249f09434800e2280f8752999195e8f1885b01520b5f7677ad\"" Jul 10 00:24:03.633916 systemd[1]: Started cri-containerd-cc79abd60a373d249f09434800e2280f8752999195e8f1885b01520b5f7677ad.scope. Jul 10 00:24:03.680000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:24:03.680000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:24:03.680000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:24:03.680000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:24:03.680000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:24:03.680000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:24:03.680000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:24:03.680000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:24:03.680000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:24:03.680000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:24:03.680000 audit: BPF prog-id=127 op=LOAD Jul 10 00:24:03.681000 audit[3038]: AVC avc: denied { bpf } for pid=3038 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:24:03.681000 audit[3038]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=2996 pid=3038 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:24:03.681000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6363373961626436306133373364323439663039343334383030653232 Jul 10 00:24:03.681000 audit[3038]: AVC avc: denied { perfmon } for pid=3038 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:24:03.681000 audit[3038]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2996 pid=3038 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:24:03.681000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6363373961626436306133373364323439663039343334383030653232 Jul 10 00:24:03.681000 audit[3038]: AVC avc: denied { bpf } for pid=3038 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:24:03.681000 audit[3038]: AVC avc: denied { bpf } for pid=3038 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:24:03.681000 audit[3038]: AVC avc: denied { bpf } for pid=3038 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:24:03.681000 audit[3038]: AVC avc: denied { perfmon } for pid=3038 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:24:03.681000 audit[3038]: AVC avc: denied { perfmon } for pid=3038 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:24:03.681000 audit[3038]: AVC avc: denied { perfmon } for pid=3038 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:24:03.681000 audit[3038]: AVC avc: denied { perfmon } for pid=3038 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:24:03.681000 audit[3038]: AVC avc: denied { perfmon } for pid=3038 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:24:03.681000 audit[3038]: AVC avc: denied { bpf } for pid=3038 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:24:03.681000 audit[3038]: AVC avc: denied { bpf } for pid=3038 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:24:03.681000 audit: BPF prog-id=128 op=LOAD Jul 10 00:24:03.681000 audit[3038]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=2996 pid=3038 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:24:03.681000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6363373961626436306133373364323439663039343334383030653232 Jul 10 00:24:03.681000 audit[3038]: AVC avc: denied { bpf } for pid=3038 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:24:03.681000 audit[3038]: AVC avc: denied { bpf } for pid=3038 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:24:03.681000 audit[3038]: AVC avc: denied { perfmon } for pid=3038 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:24:03.681000 audit[3038]: AVC avc: denied { perfmon } for pid=3038 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:24:03.681000 audit[3038]: AVC avc: denied { perfmon } for pid=3038 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:24:03.681000 audit[3038]: AVC avc: denied { perfmon } for pid=3038 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:24:03.681000 audit[3038]: AVC avc: denied { perfmon } for pid=3038 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:24:03.681000 audit[3038]: AVC avc: denied { bpf } for pid=3038 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:24:03.681000 audit[3038]: AVC avc: denied { bpf } for pid=3038 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:24:03.681000 audit: BPF prog-id=129 op=LOAD Jul 10 00:24:03.681000 audit[3038]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=2996 pid=3038 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:24:03.681000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6363373961626436306133373364323439663039343334383030653232 Jul 10 00:24:03.681000 audit: BPF prog-id=129 op=UNLOAD Jul 10 00:24:03.681000 audit: BPF prog-id=128 op=UNLOAD Jul 10 00:24:03.681000 audit[3038]: AVC avc: denied { bpf } for pid=3038 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:24:03.681000 audit[3038]: AVC avc: denied { bpf } for pid=3038 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:24:03.681000 audit[3038]: AVC avc: denied { bpf } for pid=3038 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:24:03.681000 audit[3038]: AVC avc: denied { perfmon } for pid=3038 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:24:03.681000 audit[3038]: AVC avc: denied { perfmon } for pid=3038 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:24:03.681000 audit[3038]: AVC avc: denied { perfmon } for pid=3038 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:24:03.681000 audit[3038]: AVC avc: denied { perfmon } for pid=3038 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:24:03.681000 audit[3038]: AVC avc: denied { perfmon } for pid=3038 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:24:03.681000 audit[3038]: AVC avc: denied { bpf } for pid=3038 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:24:03.681000 audit[3038]: AVC avc: denied { bpf } for pid=3038 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:24:03.681000 audit: BPF prog-id=130 op=LOAD Jul 10 00:24:03.681000 audit[3038]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=2996 pid=3038 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:24:03.681000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6363373961626436306133373364323439663039343334383030653232 Jul 10 00:24:03.694523 env[1217]: time="2025-07-10T00:24:03.694471496Z" level=info msg="StartContainer for \"cc79abd60a373d249f09434800e2280f8752999195e8f1885b01520b5f7677ad\" returns successfully" Jul 10 00:24:03.804937 kubelet[1455]: E0710 00:24:03.804890 1455 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 00:24:04.067849 kubelet[1455]: I0710 00:24:04.067795 1455 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="default/test-pod-1" podStartSLOduration=15.829888601 podStartE2EDuration="16.06777869s" podCreationTimestamp="2025-07-10 00:23:48 +0000 UTC" firstStartedPulling="2025-07-10 00:24:03.357569729 +0000 UTC m=+50.150565204" lastFinishedPulling="2025-07-10 00:24:03.595459818 +0000 UTC m=+50.388455293" observedRunningTime="2025-07-10 00:24:04.066647692 +0000 UTC m=+50.859643127" watchObservedRunningTime="2025-07-10 00:24:04.06777869 +0000 UTC m=+50.860774165" Jul 10 00:24:04.331644 systemd-networkd[1044]: cali5ec59c6bf6e: Gained IPv6LL Jul 10 00:24:04.455781 systemd[1]: run-containerd-runc-k8s.io-cc79abd60a373d249f09434800e2280f8752999195e8f1885b01520b5f7677ad-runc.0w0RRY.mount: Deactivated successfully. Jul 10 00:24:04.805846 kubelet[1455]: E0710 00:24:04.805809 1455 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 00:24:05.806312 kubelet[1455]: E0710 00:24:05.806266 1455 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"