Jul 10 00:46:11.726899 kernel: Booting Linux on physical CPU 0x0000000000 [0x413fd0c1] Jul 10 00:46:11.726917 kernel: Linux version 5.15.186-flatcar (build@pony-truck.infra.kinvolk.io) (aarch64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP PREEMPT Wed Jul 9 23:19:15 -00 2025 Jul 10 00:46:11.726925 kernel: efi: EFI v2.70 by EDK II Jul 10 00:46:11.726931 kernel: efi: SMBIOS 3.0=0xd9260000 ACPI 2.0=0xd9240000 MEMATTR=0xda32b018 RNG=0xd9220018 MEMRESERVE=0xd9521c18 Jul 10 00:46:11.726936 kernel: random: crng init done Jul 10 00:46:11.726941 kernel: ACPI: Early table checksum verification disabled Jul 10 00:46:11.726947 kernel: ACPI: RSDP 0x00000000D9240000 000024 (v02 BOCHS ) Jul 10 00:46:11.726954 kernel: ACPI: XSDT 0x00000000D9230000 000064 (v01 BOCHS BXPC 00000001 01000013) Jul 10 00:46:11.726959 kernel: ACPI: FACP 0x00000000D91E0000 000114 (v06 BOCHS BXPC 00000001 BXPC 00000001) Jul 10 00:46:11.726965 kernel: ACPI: DSDT 0x00000000D91F0000 0014A2 (v02 BOCHS BXPC 00000001 BXPC 00000001) Jul 10 00:46:11.726970 kernel: ACPI: APIC 0x00000000D91D0000 0001A8 (v04 BOCHS BXPC 00000001 BXPC 00000001) Jul 10 00:46:11.726975 kernel: ACPI: PPTT 0x00000000D91C0000 00009C (v02 BOCHS BXPC 00000001 BXPC 00000001) Jul 10 00:46:11.726980 kernel: ACPI: GTDT 0x00000000D91B0000 000060 (v02 BOCHS BXPC 00000001 BXPC 00000001) Jul 10 00:46:11.726986 kernel: ACPI: MCFG 0x00000000D91A0000 00003C (v01 BOCHS BXPC 00000001 BXPC 00000001) Jul 10 00:46:11.726994 kernel: ACPI: SPCR 0x00000000D9190000 000050 (v02 BOCHS BXPC 00000001 BXPC 00000001) Jul 10 00:46:11.726999 kernel: ACPI: DBG2 0x00000000D9180000 000057 (v00 BOCHS BXPC 00000001 BXPC 00000001) Jul 10 00:46:11.727005 kernel: ACPI: IORT 0x00000000D9170000 000080 (v03 BOCHS BXPC 00000001 BXPC 00000001) Jul 10 00:46:11.727011 kernel: ACPI: SPCR: console: pl011,mmio,0x9000000,9600 Jul 10 00:46:11.727017 kernel: NUMA: Failed to initialise from firmware Jul 10 00:46:11.727022 kernel: NUMA: Faking a node at [mem 0x0000000040000000-0x00000000dcffffff] Jul 10 00:46:11.727028 kernel: NUMA: NODE_DATA [mem 0xdcb0b900-0xdcb10fff] Jul 10 00:46:11.727034 kernel: Zone ranges: Jul 10 00:46:11.727040 kernel: DMA [mem 0x0000000040000000-0x00000000dcffffff] Jul 10 00:46:11.727046 kernel: DMA32 empty Jul 10 00:46:11.727052 kernel: Normal empty Jul 10 00:46:11.727057 kernel: Movable zone start for each node Jul 10 00:46:11.727063 kernel: Early memory node ranges Jul 10 00:46:11.727069 kernel: node 0: [mem 0x0000000040000000-0x00000000d924ffff] Jul 10 00:46:11.727074 kernel: node 0: [mem 0x00000000d9250000-0x00000000d951ffff] Jul 10 00:46:11.727080 kernel: node 0: [mem 0x00000000d9520000-0x00000000dc7fffff] Jul 10 00:46:11.727086 kernel: node 0: [mem 0x00000000dc800000-0x00000000dc88ffff] Jul 10 00:46:11.727092 kernel: node 0: [mem 0x00000000dc890000-0x00000000dc89ffff] Jul 10 00:46:11.727097 kernel: node 0: [mem 0x00000000dc8a0000-0x00000000dc9bffff] Jul 10 00:46:11.727103 kernel: node 0: [mem 0x00000000dc9c0000-0x00000000dcffffff] Jul 10 00:46:11.727109 kernel: Initmem setup node 0 [mem 0x0000000040000000-0x00000000dcffffff] Jul 10 00:46:11.727116 kernel: On node 0, zone DMA: 12288 pages in unavailable ranges Jul 10 00:46:11.727122 kernel: psci: probing for conduit method from ACPI. Jul 10 00:46:11.727128 kernel: psci: PSCIv1.1 detected in firmware. Jul 10 00:46:11.727133 kernel: psci: Using standard PSCI v0.2 function IDs Jul 10 00:46:11.727139 kernel: psci: Trusted OS migration not required Jul 10 00:46:11.727147 kernel: psci: SMC Calling Convention v1.1 Jul 10 00:46:11.727153 kernel: smccc: KVM: hypervisor services detected (0x00000000 0x00000000 0x00000000 0x00000003) Jul 10 00:46:11.727160 kernel: ACPI: SRAT not present Jul 10 00:46:11.727166 kernel: percpu: Embedded 30 pages/cpu s82968 r8192 d31720 u122880 Jul 10 00:46:11.727172 kernel: pcpu-alloc: s82968 r8192 d31720 u122880 alloc=30*4096 Jul 10 00:46:11.727178 kernel: pcpu-alloc: [0] 0 [0] 1 [0] 2 [0] 3 Jul 10 00:46:11.727184 kernel: Detected PIPT I-cache on CPU0 Jul 10 00:46:11.727190 kernel: CPU features: detected: GIC system register CPU interface Jul 10 00:46:11.727196 kernel: CPU features: detected: Hardware dirty bit management Jul 10 00:46:11.727202 kernel: CPU features: detected: Spectre-v4 Jul 10 00:46:11.727208 kernel: CPU features: detected: Spectre-BHB Jul 10 00:46:11.727216 kernel: CPU features: kernel page table isolation forced ON by KASLR Jul 10 00:46:11.727222 kernel: CPU features: detected: Kernel page table isolation (KPTI) Jul 10 00:46:11.727228 kernel: CPU features: detected: ARM erratum 1418040 Jul 10 00:46:11.727234 kernel: CPU features: detected: SSBS not fully self-synchronizing Jul 10 00:46:11.727240 kernel: Built 1 zonelists, mobility grouping on. Total pages: 633024 Jul 10 00:46:11.727246 kernel: Policy zone: DMA Jul 10 00:46:11.727253 kernel: Kernel command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected acpi=force verity.usrhash=97626bbec4e8c603c151f40dbbae5fabba3cda417023e06335ea30183b36a27f Jul 10 00:46:11.727259 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Jul 10 00:46:11.727265 kernel: Dentry cache hash table entries: 524288 (order: 10, 4194304 bytes, linear) Jul 10 00:46:11.727272 kernel: Inode-cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) Jul 10 00:46:11.727278 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Jul 10 00:46:11.727285 kernel: Memory: 2457340K/2572288K available (9792K kernel code, 2094K rwdata, 7588K rodata, 36416K init, 777K bss, 114948K reserved, 0K cma-reserved) Jul 10 00:46:11.727291 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=4, Nodes=1 Jul 10 00:46:11.727297 kernel: trace event string verifier disabled Jul 10 00:46:11.727303 kernel: rcu: Preemptible hierarchical RCU implementation. Jul 10 00:46:11.727310 kernel: rcu: RCU event tracing is enabled. Jul 10 00:46:11.727316 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=4. Jul 10 00:46:11.727322 kernel: Trampoline variant of Tasks RCU enabled. Jul 10 00:46:11.727328 kernel: Tracing variant of Tasks RCU enabled. Jul 10 00:46:11.727334 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Jul 10 00:46:11.727340 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=4 Jul 10 00:46:11.727346 kernel: NR_IRQS: 64, nr_irqs: 64, preallocated irqs: 0 Jul 10 00:46:11.727353 kernel: GICv3: 256 SPIs implemented Jul 10 00:46:11.727359 kernel: GICv3: 0 Extended SPIs implemented Jul 10 00:46:11.727365 kernel: GICv3: Distributor has no Range Selector support Jul 10 00:46:11.727371 kernel: Root IRQ handler: gic_handle_irq Jul 10 00:46:11.727377 kernel: GICv3: 16 PPIs implemented Jul 10 00:46:11.727383 kernel: GICv3: CPU0: found redistributor 0 region 0:0x00000000080a0000 Jul 10 00:46:11.727389 kernel: ACPI: SRAT not present Jul 10 00:46:11.727394 kernel: ITS [mem 0x08080000-0x0809ffff] Jul 10 00:46:11.727401 kernel: ITS@0x0000000008080000: allocated 8192 Devices @400b0000 (indirect, esz 8, psz 64K, shr 1) Jul 10 00:46:11.727407 kernel: ITS@0x0000000008080000: allocated 8192 Interrupt Collections @400c0000 (flat, esz 8, psz 64K, shr 1) Jul 10 00:46:11.727413 kernel: GICv3: using LPI property table @0x00000000400d0000 Jul 10 00:46:11.727419 kernel: GICv3: CPU0: using allocated LPI pending table @0x00000000400e0000 Jul 10 00:46:11.727426 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Jul 10 00:46:11.727432 kernel: arch_timer: cp15 timer(s) running at 25.00MHz (virt). Jul 10 00:46:11.727439 kernel: clocksource: arch_sys_counter: mask: 0xffffffffffffff max_cycles: 0x5c40939b5, max_idle_ns: 440795202646 ns Jul 10 00:46:11.727445 kernel: sched_clock: 56 bits at 25MHz, resolution 40ns, wraps every 4398046511100ns Jul 10 00:46:11.727451 kernel: arm-pv: using stolen time PV Jul 10 00:46:11.727457 kernel: Console: colour dummy device 80x25 Jul 10 00:46:11.727463 kernel: ACPI: Core revision 20210730 Jul 10 00:46:11.727470 kernel: Calibrating delay loop (skipped), value calculated using timer frequency.. 50.00 BogoMIPS (lpj=25000) Jul 10 00:46:11.727476 kernel: pid_max: default: 32768 minimum: 301 Jul 10 00:46:11.727482 kernel: LSM: Security Framework initializing Jul 10 00:46:11.727490 kernel: SELinux: Initializing. Jul 10 00:46:11.727541 kernel: Mount-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) Jul 10 00:46:11.727548 kernel: Mountpoint-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) Jul 10 00:46:11.727554 kernel: rcu: Hierarchical SRCU implementation. Jul 10 00:46:11.727560 kernel: Platform MSI: ITS@0x8080000 domain created Jul 10 00:46:11.727566 kernel: PCI/MSI: ITS@0x8080000 domain created Jul 10 00:46:11.727572 kernel: Remapping and enabling EFI services. Jul 10 00:46:11.727578 kernel: smp: Bringing up secondary CPUs ... Jul 10 00:46:11.727584 kernel: Detected PIPT I-cache on CPU1 Jul 10 00:46:11.727593 kernel: GICv3: CPU1: found redistributor 1 region 0:0x00000000080c0000 Jul 10 00:46:11.727599 kernel: GICv3: CPU1: using allocated LPI pending table @0x00000000400f0000 Jul 10 00:46:11.727605 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Jul 10 00:46:11.727611 kernel: CPU1: Booted secondary processor 0x0000000001 [0x413fd0c1] Jul 10 00:46:11.727618 kernel: Detected PIPT I-cache on CPU2 Jul 10 00:46:11.727624 kernel: GICv3: CPU2: found redistributor 2 region 0:0x00000000080e0000 Jul 10 00:46:11.727630 kernel: GICv3: CPU2: using allocated LPI pending table @0x0000000040100000 Jul 10 00:46:11.727637 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Jul 10 00:46:11.727643 kernel: CPU2: Booted secondary processor 0x0000000002 [0x413fd0c1] Jul 10 00:46:11.727649 kernel: Detected PIPT I-cache on CPU3 Jul 10 00:46:11.727656 kernel: GICv3: CPU3: found redistributor 3 region 0:0x0000000008100000 Jul 10 00:46:11.727662 kernel: GICv3: CPU3: using allocated LPI pending table @0x0000000040110000 Jul 10 00:46:11.727668 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Jul 10 00:46:11.727675 kernel: CPU3: Booted secondary processor 0x0000000003 [0x413fd0c1] Jul 10 00:46:11.727685 kernel: smp: Brought up 1 node, 4 CPUs Jul 10 00:46:11.727692 kernel: SMP: Total of 4 processors activated. Jul 10 00:46:11.727699 kernel: CPU features: detected: 32-bit EL0 Support Jul 10 00:46:11.727705 kernel: CPU features: detected: Data cache clean to the PoU not required for I/D coherence Jul 10 00:46:11.727712 kernel: CPU features: detected: Common not Private translations Jul 10 00:46:11.727718 kernel: CPU features: detected: CRC32 instructions Jul 10 00:46:11.727725 kernel: CPU features: detected: RCpc load-acquire (LDAPR) Jul 10 00:46:11.727731 kernel: CPU features: detected: LSE atomic instructions Jul 10 00:46:11.727739 kernel: CPU features: detected: Privileged Access Never Jul 10 00:46:11.727746 kernel: CPU features: detected: RAS Extension Support Jul 10 00:46:11.727752 kernel: CPU features: detected: Speculative Store Bypassing Safe (SSBS) Jul 10 00:46:11.727759 kernel: CPU: All CPU(s) started at EL1 Jul 10 00:46:11.727765 kernel: alternatives: patching kernel code Jul 10 00:46:11.727772 kernel: devtmpfs: initialized Jul 10 00:46:11.727785 kernel: KASLR enabled Jul 10 00:46:11.727792 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Jul 10 00:46:11.727798 kernel: futex hash table entries: 1024 (order: 4, 65536 bytes, linear) Jul 10 00:46:11.727805 kernel: pinctrl core: initialized pinctrl subsystem Jul 10 00:46:11.727811 kernel: SMBIOS 3.0.0 present. Jul 10 00:46:11.727818 kernel: DMI: QEMU KVM Virtual Machine, BIOS 0.0.0 02/06/2015 Jul 10 00:46:11.727824 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Jul 10 00:46:11.727831 kernel: DMA: preallocated 512 KiB GFP_KERNEL pool for atomic allocations Jul 10 00:46:11.727839 kernel: DMA: preallocated 512 KiB GFP_KERNEL|GFP_DMA pool for atomic allocations Jul 10 00:46:11.727846 kernel: DMA: preallocated 512 KiB GFP_KERNEL|GFP_DMA32 pool for atomic allocations Jul 10 00:46:11.727853 kernel: audit: initializing netlink subsys (disabled) Jul 10 00:46:11.727859 kernel: audit: type=2000 audit(0.032:1): state=initialized audit_enabled=0 res=1 Jul 10 00:46:11.727866 kernel: thermal_sys: Registered thermal governor 'step_wise' Jul 10 00:46:11.727872 kernel: cpuidle: using governor menu Jul 10 00:46:11.727879 kernel: hw-breakpoint: found 6 breakpoint and 4 watchpoint registers. Jul 10 00:46:11.727885 kernel: ASID allocator initialised with 32768 entries Jul 10 00:46:11.727891 kernel: ACPI: bus type PCI registered Jul 10 00:46:11.727899 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Jul 10 00:46:11.727905 kernel: Serial: AMBA PL011 UART driver Jul 10 00:46:11.727912 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Jul 10 00:46:11.727918 kernel: HugeTLB registered 32.0 MiB page size, pre-allocated 0 pages Jul 10 00:46:11.727925 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Jul 10 00:46:11.727931 kernel: HugeTLB registered 64.0 KiB page size, pre-allocated 0 pages Jul 10 00:46:11.727938 kernel: cryptd: max_cpu_qlen set to 1000 Jul 10 00:46:11.727944 kernel: alg: No test for fips(ansi_cprng) (fips_ansi_cprng) Jul 10 00:46:11.727951 kernel: ACPI: Added _OSI(Module Device) Jul 10 00:46:11.727959 kernel: ACPI: Added _OSI(Processor Device) Jul 10 00:46:11.727965 kernel: ACPI: Added _OSI(Processor Aggregator Device) Jul 10 00:46:11.727972 kernel: ACPI: Added _OSI(Linux-Dell-Video) Jul 10 00:46:11.727978 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Jul 10 00:46:11.727985 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Jul 10 00:46:11.727991 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded Jul 10 00:46:11.727998 kernel: ACPI: Interpreter enabled Jul 10 00:46:11.728004 kernel: ACPI: Using GIC for interrupt routing Jul 10 00:46:11.728011 kernel: ACPI: MCFG table detected, 1 entries Jul 10 00:46:11.728018 kernel: ARMH0011:00: ttyAMA0 at MMIO 0x9000000 (irq = 12, base_baud = 0) is a SBSA Jul 10 00:46:11.728025 kernel: printk: console [ttyAMA0] enabled Jul 10 00:46:11.728031 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff]) Jul 10 00:46:11.728154 kernel: acpi PNP0A08:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI HPX-Type3] Jul 10 00:46:11.728214 kernel: acpi PNP0A08:00: _OSC: platform does not support [LTR] Jul 10 00:46:11.728271 kernel: acpi PNP0A08:00: _OSC: OS now controls [PCIeHotplug PME AER PCIeCapability] Jul 10 00:46:11.728326 kernel: acpi PNP0A08:00: ECAM area [mem 0x4010000000-0x401fffffff] reserved by PNP0C02:00 Jul 10 00:46:11.728383 kernel: acpi PNP0A08:00: ECAM at [mem 0x4010000000-0x401fffffff] for [bus 00-ff] Jul 10 00:46:11.728392 kernel: ACPI: Remapped I/O 0x000000003eff0000 to [io 0x0000-0xffff window] Jul 10 00:46:11.728398 kernel: PCI host bridge to bus 0000:00 Jul 10 00:46:11.728463 kernel: pci_bus 0000:00: root bus resource [mem 0x10000000-0x3efeffff window] Jul 10 00:46:11.728530 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0xffff window] Jul 10 00:46:11.728582 kernel: pci_bus 0000:00: root bus resource [mem 0x8000000000-0xffffffffff window] Jul 10 00:46:11.728633 kernel: pci_bus 0000:00: root bus resource [bus 00-ff] Jul 10 00:46:11.728706 kernel: pci 0000:00:00.0: [1b36:0008] type 00 class 0x060000 Jul 10 00:46:11.728785 kernel: pci 0000:00:01.0: [1af4:1005] type 00 class 0x00ff00 Jul 10 00:46:11.728846 kernel: pci 0000:00:01.0: reg 0x10: [io 0x0000-0x001f] Jul 10 00:46:11.728904 kernel: pci 0000:00:01.0: reg 0x14: [mem 0x10000000-0x10000fff] Jul 10 00:46:11.728961 kernel: pci 0000:00:01.0: reg 0x20: [mem 0x8000000000-0x8000003fff 64bit pref] Jul 10 00:46:11.729018 kernel: pci 0000:00:01.0: BAR 4: assigned [mem 0x8000000000-0x8000003fff 64bit pref] Jul 10 00:46:11.729074 kernel: pci 0000:00:01.0: BAR 1: assigned [mem 0x10000000-0x10000fff] Jul 10 00:46:11.729133 kernel: pci 0000:00:01.0: BAR 0: assigned [io 0x1000-0x101f] Jul 10 00:46:11.729183 kernel: pci_bus 0000:00: resource 4 [mem 0x10000000-0x3efeffff window] Jul 10 00:46:11.729232 kernel: pci_bus 0000:00: resource 5 [io 0x0000-0xffff window] Jul 10 00:46:11.729282 kernel: pci_bus 0000:00: resource 6 [mem 0x8000000000-0xffffffffff window] Jul 10 00:46:11.729291 kernel: ACPI: PCI: Interrupt link GSI0 configured for IRQ 35 Jul 10 00:46:11.729298 kernel: ACPI: PCI: Interrupt link GSI1 configured for IRQ 36 Jul 10 00:46:11.729304 kernel: ACPI: PCI: Interrupt link GSI2 configured for IRQ 37 Jul 10 00:46:11.729311 kernel: ACPI: PCI: Interrupt link GSI3 configured for IRQ 38 Jul 10 00:46:11.729319 kernel: iommu: Default domain type: Translated Jul 10 00:46:11.729326 kernel: iommu: DMA domain TLB invalidation policy: strict mode Jul 10 00:46:11.729332 kernel: vgaarb: loaded Jul 10 00:46:11.729339 kernel: pps_core: LinuxPPS API ver. 1 registered Jul 10 00:46:11.729345 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Jul 10 00:46:11.729352 kernel: PTP clock support registered Jul 10 00:46:11.729358 kernel: Registered efivars operations Jul 10 00:46:11.729365 kernel: clocksource: Switched to clocksource arch_sys_counter Jul 10 00:46:11.729371 kernel: VFS: Disk quotas dquot_6.6.0 Jul 10 00:46:11.729379 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Jul 10 00:46:11.729386 kernel: pnp: PnP ACPI init Jul 10 00:46:11.729447 kernel: system 00:00: [mem 0x4010000000-0x401fffffff window] could not be reserved Jul 10 00:46:11.729456 kernel: pnp: PnP ACPI: found 1 devices Jul 10 00:46:11.729463 kernel: NET: Registered PF_INET protocol family Jul 10 00:46:11.729469 kernel: IP idents hash table entries: 65536 (order: 7, 524288 bytes, linear) Jul 10 00:46:11.729476 kernel: tcp_listen_portaddr_hash hash table entries: 2048 (order: 3, 32768 bytes, linear) Jul 10 00:46:11.729482 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Jul 10 00:46:11.729491 kernel: TCP established hash table entries: 32768 (order: 6, 262144 bytes, linear) Jul 10 00:46:11.729508 kernel: TCP bind hash table entries: 32768 (order: 7, 524288 bytes, linear) Jul 10 00:46:11.729515 kernel: TCP: Hash tables configured (established 32768 bind 32768) Jul 10 00:46:11.729521 kernel: UDP hash table entries: 2048 (order: 4, 65536 bytes, linear) Jul 10 00:46:11.729528 kernel: UDP-Lite hash table entries: 2048 (order: 4, 65536 bytes, linear) Jul 10 00:46:11.729535 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Jul 10 00:46:11.729541 kernel: PCI: CLS 0 bytes, default 64 Jul 10 00:46:11.729548 kernel: hw perfevents: enabled with armv8_pmuv3_0 PMU driver, 7 counters available Jul 10 00:46:11.729554 kernel: kvm [1]: HYP mode not available Jul 10 00:46:11.729562 kernel: Initialise system trusted keyrings Jul 10 00:46:11.729569 kernel: workingset: timestamp_bits=39 max_order=20 bucket_order=0 Jul 10 00:46:11.729576 kernel: Key type asymmetric registered Jul 10 00:46:11.729582 kernel: Asymmetric key parser 'x509' registered Jul 10 00:46:11.729589 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Jul 10 00:46:11.729596 kernel: io scheduler mq-deadline registered Jul 10 00:46:11.729602 kernel: io scheduler kyber registered Jul 10 00:46:11.729609 kernel: io scheduler bfq registered Jul 10 00:46:11.729615 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXSYBUS:00/PNP0C0C:00/input/input0 Jul 10 00:46:11.729623 kernel: ACPI: button: Power Button [PWRB] Jul 10 00:46:11.729630 kernel: ACPI: \_SB_.PCI0.GSI1: Enabled at IRQ 36 Jul 10 00:46:11.729705 kernel: virtio-pci 0000:00:01.0: enabling device (0005 -> 0007) Jul 10 00:46:11.729714 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Jul 10 00:46:11.729720 kernel: thunder_xcv, ver 1.0 Jul 10 00:46:11.729727 kernel: thunder_bgx, ver 1.0 Jul 10 00:46:11.729733 kernel: nicpf, ver 1.0 Jul 10 00:46:11.729739 kernel: nicvf, ver 1.0 Jul 10 00:46:11.729809 kernel: rtc-efi rtc-efi.0: registered as rtc0 Jul 10 00:46:11.729866 kernel: rtc-efi rtc-efi.0: setting system clock to 2025-07-10T00:46:11 UTC (1752108371) Jul 10 00:46:11.729874 kernel: hid: raw HID events driver (C) Jiri Kosina Jul 10 00:46:11.729882 kernel: NET: Registered PF_INET6 protocol family Jul 10 00:46:11.729888 kernel: Segment Routing with IPv6 Jul 10 00:46:11.729895 kernel: In-situ OAM (IOAM) with IPv6 Jul 10 00:46:11.729902 kernel: NET: Registered PF_PACKET protocol family Jul 10 00:46:11.729908 kernel: Key type dns_resolver registered Jul 10 00:46:11.729915 kernel: registered taskstats version 1 Jul 10 00:46:11.729923 kernel: Loading compiled-in X.509 certificates Jul 10 00:46:11.729929 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.186-flatcar: 9e274a0dc4fc3d34232d90d226b034c4fe0e3e22' Jul 10 00:46:11.729936 kernel: Key type .fscrypt registered Jul 10 00:46:11.729942 kernel: Key type fscrypt-provisioning registered Jul 10 00:46:11.729949 kernel: ima: No TPM chip found, activating TPM-bypass! Jul 10 00:46:11.729955 kernel: ima: Allocated hash algorithm: sha1 Jul 10 00:46:11.729962 kernel: ima: No architecture policies found Jul 10 00:46:11.729968 kernel: clk: Disabling unused clocks Jul 10 00:46:11.729975 kernel: Freeing unused kernel memory: 36416K Jul 10 00:46:11.729983 kernel: Run /init as init process Jul 10 00:46:11.729989 kernel: with arguments: Jul 10 00:46:11.729995 kernel: /init Jul 10 00:46:11.730002 kernel: with environment: Jul 10 00:46:11.730008 kernel: HOME=/ Jul 10 00:46:11.730014 kernel: TERM=linux Jul 10 00:46:11.730021 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Jul 10 00:46:11.730030 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Jul 10 00:46:11.730040 systemd[1]: Detected virtualization kvm. Jul 10 00:46:11.730047 systemd[1]: Detected architecture arm64. Jul 10 00:46:11.730054 systemd[1]: Running in initrd. Jul 10 00:46:11.730060 systemd[1]: No hostname configured, using default hostname. Jul 10 00:46:11.730068 systemd[1]: Hostname set to . Jul 10 00:46:11.730075 systemd[1]: Initializing machine ID from VM UUID. Jul 10 00:46:11.730082 systemd[1]: Queued start job for default target initrd.target. Jul 10 00:46:11.730089 systemd[1]: Started systemd-ask-password-console.path. Jul 10 00:46:11.730097 systemd[1]: Reached target cryptsetup.target. Jul 10 00:46:11.730104 systemd[1]: Reached target paths.target. Jul 10 00:46:11.730111 systemd[1]: Reached target slices.target. Jul 10 00:46:11.730118 systemd[1]: Reached target swap.target. Jul 10 00:46:11.730124 systemd[1]: Reached target timers.target. Jul 10 00:46:11.730132 systemd[1]: Listening on iscsid.socket. Jul 10 00:46:11.730139 systemd[1]: Listening on iscsiuio.socket. Jul 10 00:46:11.730147 systemd[1]: Listening on systemd-journald-audit.socket. Jul 10 00:46:11.730154 systemd[1]: Listening on systemd-journald-dev-log.socket. Jul 10 00:46:11.730161 systemd[1]: Listening on systemd-journald.socket. Jul 10 00:46:11.730168 systemd[1]: Listening on systemd-networkd.socket. Jul 10 00:46:11.730175 systemd[1]: Listening on systemd-udevd-control.socket. Jul 10 00:46:11.730182 systemd[1]: Listening on systemd-udevd-kernel.socket. Jul 10 00:46:11.730189 systemd[1]: Reached target sockets.target. Jul 10 00:46:11.730196 systemd[1]: Starting kmod-static-nodes.service... Jul 10 00:46:11.730202 systemd[1]: Finished network-cleanup.service. Jul 10 00:46:11.730211 systemd[1]: Starting systemd-fsck-usr.service... Jul 10 00:46:11.730218 systemd[1]: Starting systemd-journald.service... Jul 10 00:46:11.730224 systemd[1]: Starting systemd-modules-load.service... Jul 10 00:46:11.730231 systemd[1]: Starting systemd-resolved.service... Jul 10 00:46:11.730238 systemd[1]: Starting systemd-vconsole-setup.service... Jul 10 00:46:11.730245 systemd[1]: Finished kmod-static-nodes.service. Jul 10 00:46:11.730252 systemd[1]: Finished systemd-fsck-usr.service. Jul 10 00:46:11.730259 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Jul 10 00:46:11.730265 systemd[1]: Finished systemd-vconsole-setup.service. Jul 10 00:46:11.730277 systemd-journald[289]: Journal started Jul 10 00:46:11.730313 systemd-journald[289]: Runtime Journal (/run/log/journal/f309801408194431aaf555492ae1024b) is 6.0M, max 48.7M, 42.6M free. Jul 10 00:46:11.721650 systemd-modules-load[290]: Inserted module 'overlay' Jul 10 00:46:11.736168 systemd[1]: Started systemd-journald.service. Jul 10 00:46:11.736190 kernel: audit: type=1130 audit(1752108371.731:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:46:11.731000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:46:11.736000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:46:11.737204 systemd-resolved[291]: Positive Trust Anchors: Jul 10 00:46:11.744872 kernel: audit: type=1130 audit(1752108371.736:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:46:11.744899 kernel: audit: type=1130 audit(1752108371.740:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:46:11.744909 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Jul 10 00:46:11.740000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:46:11.737211 systemd-resolved[291]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Jul 10 00:46:11.737237 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Jul 10 00:46:11.750558 kernel: audit: type=1130 audit(1752108371.746:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:46:11.746000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:46:11.737262 systemd-resolved[291]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Jul 10 00:46:11.756518 kernel: Bridge firewalling registered Jul 10 00:46:11.741146 systemd[1]: Starting dracut-cmdline-ask.service... Jul 10 00:46:11.741596 systemd-resolved[291]: Defaulting to hostname 'linux'. Jul 10 00:46:11.745674 systemd[1]: Started systemd-resolved.service. Jul 10 00:46:11.747561 systemd[1]: Reached target nss-lookup.target. Jul 10 00:46:11.756122 systemd-modules-load[290]: Inserted module 'br_netfilter' Jul 10 00:46:11.760378 systemd[1]: Finished dracut-cmdline-ask.service. Jul 10 00:46:11.761000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:46:11.762618 systemd[1]: Starting dracut-cmdline.service... Jul 10 00:46:11.766071 kernel: audit: type=1130 audit(1752108371.761:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:46:11.767524 kernel: SCSI subsystem initialized Jul 10 00:46:11.771152 dracut-cmdline[306]: dracut-dracut-053 Jul 10 00:46:11.773725 dracut-cmdline[306]: Using kernel command line parameters: rd.driver.pre=btrfs BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected acpi=force verity.usrhash=97626bbec4e8c603c151f40dbbae5fabba3cda417023e06335ea30183b36a27f Jul 10 00:46:11.780504 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Jul 10 00:46:11.780524 kernel: device-mapper: uevent: version 1.0.3 Jul 10 00:46:11.780534 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Jul 10 00:46:11.780699 systemd-modules-load[290]: Inserted module 'dm_multipath' Jul 10 00:46:11.781478 systemd[1]: Finished systemd-modules-load.service. Jul 10 00:46:11.783000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:46:11.783873 systemd[1]: Starting systemd-sysctl.service... Jul 10 00:46:11.786888 kernel: audit: type=1130 audit(1752108371.783:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:46:11.792000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:46:11.792411 systemd[1]: Finished systemd-sysctl.service. Jul 10 00:46:11.796528 kernel: audit: type=1130 audit(1752108371.792:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:46:11.840522 kernel: Loading iSCSI transport class v2.0-870. Jul 10 00:46:11.855511 kernel: iscsi: registered transport (tcp) Jul 10 00:46:11.870521 kernel: iscsi: registered transport (qla4xxx) Jul 10 00:46:11.870558 kernel: QLogic iSCSI HBA Driver Jul 10 00:46:11.904000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:46:11.904300 systemd[1]: Finished dracut-cmdline.service. Jul 10 00:46:11.908973 kernel: audit: type=1130 audit(1752108371.904:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:46:11.905998 systemd[1]: Starting dracut-pre-udev.service... Jul 10 00:46:11.947522 kernel: raid6: neonx8 gen() 12240 MB/s Jul 10 00:46:11.964517 kernel: raid6: neonx8 xor() 10762 MB/s Jul 10 00:46:11.981515 kernel: raid6: neonx4 gen() 13535 MB/s Jul 10 00:46:11.998516 kernel: raid6: neonx4 xor() 11236 MB/s Jul 10 00:46:12.015534 kernel: raid6: neonx2 gen() 12931 MB/s Jul 10 00:46:12.032527 kernel: raid6: neonx2 xor() 10281 MB/s Jul 10 00:46:12.049518 kernel: raid6: neonx1 gen() 10604 MB/s Jul 10 00:46:12.066517 kernel: raid6: neonx1 xor() 8778 MB/s Jul 10 00:46:12.083518 kernel: raid6: int64x8 gen() 6265 MB/s Jul 10 00:46:12.100514 kernel: raid6: int64x8 xor() 3539 MB/s Jul 10 00:46:12.117515 kernel: raid6: int64x4 gen() 7229 MB/s Jul 10 00:46:12.134516 kernel: raid6: int64x4 xor() 3840 MB/s Jul 10 00:46:12.151518 kernel: raid6: int64x2 gen() 6142 MB/s Jul 10 00:46:12.168516 kernel: raid6: int64x2 xor() 3318 MB/s Jul 10 00:46:12.185526 kernel: raid6: int64x1 gen() 5039 MB/s Jul 10 00:46:12.202603 kernel: raid6: int64x1 xor() 2642 MB/s Jul 10 00:46:12.202613 kernel: raid6: using algorithm neonx4 gen() 13535 MB/s Jul 10 00:46:12.202622 kernel: raid6: .... xor() 11236 MB/s, rmw enabled Jul 10 00:46:12.203690 kernel: raid6: using neon recovery algorithm Jul 10 00:46:12.215001 kernel: xor: measuring software checksum speed Jul 10 00:46:12.215015 kernel: 8regs : 16640 MB/sec Jul 10 00:46:12.215024 kernel: 32regs : 20665 MB/sec Jul 10 00:46:12.215617 kernel: arm64_neon : 27395 MB/sec Jul 10 00:46:12.215630 kernel: xor: using function: arm64_neon (27395 MB/sec) Jul 10 00:46:12.270518 kernel: Btrfs loaded, crc32c=crc32c-generic, zoned=no, fsverity=no Jul 10 00:46:12.281057 systemd[1]: Finished dracut-pre-udev.service. Jul 10 00:46:12.281000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:46:12.284000 audit: BPF prog-id=7 op=LOAD Jul 10 00:46:12.284000 audit: BPF prog-id=8 op=LOAD Jul 10 00:46:12.285303 systemd[1]: Starting systemd-udevd.service... Jul 10 00:46:12.286803 kernel: audit: type=1130 audit(1752108372.281:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:46:12.299640 systemd-udevd[490]: Using default interface naming scheme 'v252'. Jul 10 00:46:12.302918 systemd[1]: Started systemd-udevd.service. Jul 10 00:46:12.304000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:46:12.306211 systemd[1]: Starting dracut-pre-trigger.service... Jul 10 00:46:12.316820 dracut-pre-trigger[501]: rd.md=0: removing MD RAID activation Jul 10 00:46:12.345694 systemd[1]: Finished dracut-pre-trigger.service. Jul 10 00:46:12.345000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:46:12.347385 systemd[1]: Starting systemd-udev-trigger.service... Jul 10 00:46:12.381793 systemd[1]: Finished systemd-udev-trigger.service. Jul 10 00:46:12.382000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:46:12.408971 kernel: virtio_blk virtio1: [vda] 19775488 512-byte logical blocks (10.1 GB/9.43 GiB) Jul 10 00:46:12.415225 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Jul 10 00:46:12.415240 kernel: GPT:9289727 != 19775487 Jul 10 00:46:12.415249 kernel: GPT:Alternate GPT header not at the end of the disk. Jul 10 00:46:12.415257 kernel: GPT:9289727 != 19775487 Jul 10 00:46:12.415265 kernel: GPT: Use GNU Parted to correct GPT errors. Jul 10 00:46:12.415279 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Jul 10 00:46:12.428515 kernel: BTRFS: device label OEM devid 1 transid 10 /dev/vda6 scanned by (udev-worker) (544) Jul 10 00:46:12.430513 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Jul 10 00:46:12.435377 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Jul 10 00:46:12.436431 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Jul 10 00:46:12.442489 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Jul 10 00:46:12.446717 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Jul 10 00:46:12.448433 systemd[1]: Starting disk-uuid.service... Jul 10 00:46:12.496604 disk-uuid[561]: Primary Header is updated. Jul 10 00:46:12.496604 disk-uuid[561]: Secondary Entries is updated. Jul 10 00:46:12.496604 disk-uuid[561]: Secondary Header is updated. Jul 10 00:46:12.500528 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Jul 10 00:46:13.524533 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Jul 10 00:46:13.524973 disk-uuid[562]: The operation has completed successfully. Jul 10 00:46:13.552202 systemd[1]: disk-uuid.service: Deactivated successfully. Jul 10 00:46:13.552000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:46:13.552000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:46:13.552297 systemd[1]: Finished disk-uuid.service. Jul 10 00:46:13.553935 systemd[1]: Starting verity-setup.service... Jul 10 00:46:13.569563 kernel: device-mapper: verity: sha256 using implementation "sha256-ce" Jul 10 00:46:13.594136 systemd[1]: Found device dev-mapper-usr.device. Jul 10 00:46:13.596380 systemd[1]: Mounting sysusr-usr.mount... Jul 10 00:46:13.598182 systemd[1]: Finished verity-setup.service. Jul 10 00:46:13.598000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:46:13.656515 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Jul 10 00:46:13.657065 systemd[1]: Mounted sysusr-usr.mount. Jul 10 00:46:13.657908 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Jul 10 00:46:13.658616 systemd[1]: Starting ignition-setup.service... Jul 10 00:46:13.660825 systemd[1]: Starting parse-ip-for-networkd.service... Jul 10 00:46:13.669699 kernel: BTRFS info (device vda6): using crc32c (crc32c-generic) checksum algorithm Jul 10 00:46:13.669735 kernel: BTRFS info (device vda6): using free space tree Jul 10 00:46:13.669746 kernel: BTRFS info (device vda6): has skinny extents Jul 10 00:46:13.679033 systemd[1]: mnt-oem.mount: Deactivated successfully. Jul 10 00:46:13.685750 systemd[1]: Finished ignition-setup.service. Jul 10 00:46:13.686000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:46:13.687374 systemd[1]: Starting ignition-fetch-offline.service... Jul 10 00:46:13.742167 systemd[1]: Finished parse-ip-for-networkd.service. Jul 10 00:46:13.742000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:46:13.744000 audit: BPF prog-id=9 op=LOAD Jul 10 00:46:13.745998 systemd[1]: Starting systemd-networkd.service... Jul 10 00:46:13.769948 systemd-networkd[739]: lo: Link UP Jul 10 00:46:13.770868 systemd-networkd[739]: lo: Gained carrier Jul 10 00:46:13.772334 systemd-networkd[739]: Enumeration completed Jul 10 00:46:13.773273 systemd[1]: Started systemd-networkd.service. Jul 10 00:46:13.773000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:46:13.774349 systemd[1]: Reached target network.target. Jul 10 00:46:13.776490 systemd[1]: Starting iscsiuio.service... Jul 10 00:46:13.777044 ignition[652]: Ignition 2.14.0 Jul 10 00:46:13.778302 systemd-networkd[739]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Jul 10 00:46:13.777050 ignition[652]: Stage: fetch-offline Jul 10 00:46:13.777087 ignition[652]: no configs at "/usr/lib/ignition/base.d" Jul 10 00:46:13.782029 systemd-networkd[739]: eth0: Link UP Jul 10 00:46:13.777095 ignition[652]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" Jul 10 00:46:13.782034 systemd-networkd[739]: eth0: Gained carrier Jul 10 00:46:13.777233 ignition[652]: parsed url from cmdline: "" Jul 10 00:46:13.777236 ignition[652]: no config URL provided Jul 10 00:46:13.777240 ignition[652]: reading system config file "/usr/lib/ignition/user.ign" Jul 10 00:46:13.787000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:46:13.786326 systemd[1]: Started iscsiuio.service. Jul 10 00:46:13.777248 ignition[652]: no config at "/usr/lib/ignition/user.ign" Jul 10 00:46:13.788514 systemd[1]: Starting iscsid.service... Jul 10 00:46:13.777265 ignition[652]: op(1): [started] loading QEMU firmware config module Jul 10 00:46:13.793140 iscsid[746]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Jul 10 00:46:13.793140 iscsid[746]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log Jul 10 00:46:13.793140 iscsid[746]: into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Jul 10 00:46:13.793140 iscsid[746]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Jul 10 00:46:13.793140 iscsid[746]: If using hardware iscsi like qla4xxx this message can be ignored. Jul 10 00:46:13.793140 iscsid[746]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Jul 10 00:46:13.793140 iscsid[746]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Jul 10 00:46:13.798000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:46:13.777269 ignition[652]: op(1): executing: "modprobe" "qemu_fw_cfg" Jul 10 00:46:13.795214 systemd[1]: Started iscsid.service. Jul 10 00:46:13.783443 ignition[652]: op(1): [finished] loading QEMU firmware config module Jul 10 00:46:13.796585 systemd-networkd[739]: eth0: DHCPv4 address 10.0.0.135/16, gateway 10.0.0.1 acquired from 10.0.0.1 Jul 10 00:46:13.803567 ignition[652]: parsing config with SHA512: 8a5054477b5055961bbc1f8df2dc3cf835283033a2ac46db553ec12cf1530dc24bf82e5c41fe2b9295b8f0ce7c5b35be8f77c2c2a1d422ac099cd60aa58a09f7 Jul 10 00:46:13.799947 systemd[1]: Starting dracut-initqueue.service... Jul 10 00:46:13.810305 ignition[652]: fetch-offline: fetch-offline passed Jul 10 00:46:13.809708 unknown[652]: fetched base config from "system" Jul 10 00:46:13.812000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:46:13.810390 ignition[652]: Ignition finished successfully Jul 10 00:46:13.813000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:46:13.809719 unknown[652]: fetched user config from "qemu" Jul 10 00:46:13.811562 systemd[1]: Finished ignition-fetch-offline.service. Jul 10 00:46:13.813053 systemd[1]: Finished dracut-initqueue.service. Jul 10 00:46:13.814342 systemd[1]: Reached target remote-fs-pre.target. Jul 10 00:46:13.815598 systemd[1]: Reached target remote-cryptsetup.target. Jul 10 00:46:13.816946 systemd[1]: Reached target remote-fs.target. Jul 10 00:46:13.819008 systemd[1]: Starting dracut-pre-mount.service... Jul 10 00:46:13.820306 systemd[1]: ignition-fetch.service was skipped because of an unmet condition check (ConditionPathExists=!/run/ignition.json). Jul 10 00:46:13.821001 systemd[1]: Starting ignition-kargs.service... Jul 10 00:46:13.826800 systemd[1]: Finished dracut-pre-mount.service. Jul 10 00:46:13.827000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:46:13.829557 ignition[756]: Ignition 2.14.0 Jul 10 00:46:13.829567 ignition[756]: Stage: kargs Jul 10 00:46:13.829659 ignition[756]: no configs at "/usr/lib/ignition/base.d" Jul 10 00:46:13.829668 ignition[756]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" Jul 10 00:46:13.831865 systemd[1]: Finished ignition-kargs.service. Jul 10 00:46:13.832000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:46:13.830283 ignition[756]: kargs: kargs passed Jul 10 00:46:13.830320 ignition[756]: Ignition finished successfully Jul 10 00:46:13.834176 systemd[1]: Starting ignition-disks.service... Jul 10 00:46:13.840524 ignition[765]: Ignition 2.14.0 Jul 10 00:46:13.840536 ignition[765]: Stage: disks Jul 10 00:46:13.840622 ignition[765]: no configs at "/usr/lib/ignition/base.d" Jul 10 00:46:13.842488 systemd[1]: Finished ignition-disks.service. Jul 10 00:46:13.843000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:46:13.840632 ignition[765]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" Jul 10 00:46:13.844038 systemd[1]: Reached target initrd-root-device.target. Jul 10 00:46:13.841578 ignition[765]: disks: disks passed Jul 10 00:46:13.845313 systemd[1]: Reached target local-fs-pre.target. Jul 10 00:46:13.841619 ignition[765]: Ignition finished successfully Jul 10 00:46:13.846905 systemd[1]: Reached target local-fs.target. Jul 10 00:46:13.848236 systemd[1]: Reached target sysinit.target. Jul 10 00:46:13.849390 systemd[1]: Reached target basic.target. Jul 10 00:46:13.851472 systemd[1]: Starting systemd-fsck-root.service... Jul 10 00:46:13.864407 systemd-fsck[773]: ROOT: clean, 619/553520 files, 56022/553472 blocks Jul 10 00:46:13.867209 systemd[1]: Finished systemd-fsck-root.service. Jul 10 00:46:13.868000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:46:13.869488 systemd[1]: Mounting sysroot.mount... Jul 10 00:46:13.881521 kernel: EXT4-fs (vda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Jul 10 00:46:13.882058 systemd[1]: Mounted sysroot.mount. Jul 10 00:46:13.882905 systemd[1]: Reached target initrd-root-fs.target. Jul 10 00:46:13.885086 systemd[1]: Mounting sysroot-usr.mount... Jul 10 00:46:13.885969 systemd[1]: flatcar-metadata-hostname.service was skipped because no trigger condition checks were met. Jul 10 00:46:13.886008 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Jul 10 00:46:13.886034 systemd[1]: Reached target ignition-diskful.target. Jul 10 00:46:13.887950 systemd[1]: Mounted sysroot-usr.mount. Jul 10 00:46:13.889777 systemd[1]: Starting initrd-setup-root.service... Jul 10 00:46:13.893893 initrd-setup-root[783]: cut: /sysroot/etc/passwd: No such file or directory Jul 10 00:46:13.897338 initrd-setup-root[791]: cut: /sysroot/etc/group: No such file or directory Jul 10 00:46:13.901358 initrd-setup-root[799]: cut: /sysroot/etc/shadow: No such file or directory Jul 10 00:46:13.905351 initrd-setup-root[807]: cut: /sysroot/etc/gshadow: No such file or directory Jul 10 00:46:13.934281 systemd[1]: Finished initrd-setup-root.service. Jul 10 00:46:13.934000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:46:13.935947 systemd[1]: Starting ignition-mount.service... Jul 10 00:46:13.937289 systemd[1]: Starting sysroot-boot.service... Jul 10 00:46:13.941215 bash[824]: umount: /sysroot/usr/share/oem: not mounted. Jul 10 00:46:13.949025 ignition[825]: INFO : Ignition 2.14.0 Jul 10 00:46:13.949025 ignition[825]: INFO : Stage: mount Jul 10 00:46:13.951185 ignition[825]: INFO : no configs at "/usr/lib/ignition/base.d" Jul 10 00:46:13.951185 ignition[825]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" Jul 10 00:46:13.951185 ignition[825]: INFO : mount: mount passed Jul 10 00:46:13.951185 ignition[825]: INFO : Ignition finished successfully Jul 10 00:46:13.953000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:46:13.952182 systemd[1]: Finished ignition-mount.service. Jul 10 00:46:13.962636 systemd[1]: Finished sysroot-boot.service. Jul 10 00:46:13.962000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:46:14.613636 systemd[1]: Mounting sysroot-usr-share-oem.mount... Jul 10 00:46:14.624331 kernel: BTRFS: device label OEM devid 1 transid 11 /dev/vda6 scanned by mount (835) Jul 10 00:46:14.624377 kernel: BTRFS info (device vda6): using crc32c (crc32c-generic) checksum algorithm Jul 10 00:46:14.624387 kernel: BTRFS info (device vda6): using free space tree Jul 10 00:46:14.624967 kernel: BTRFS info (device vda6): has skinny extents Jul 10 00:46:14.630222 systemd[1]: Mounted sysroot-usr-share-oem.mount. Jul 10 00:46:14.632684 systemd[1]: Starting ignition-files.service... Jul 10 00:46:14.648107 ignition[855]: INFO : Ignition 2.14.0 Jul 10 00:46:14.648107 ignition[855]: INFO : Stage: files Jul 10 00:46:14.648107 ignition[855]: INFO : no configs at "/usr/lib/ignition/base.d" Jul 10 00:46:14.648107 ignition[855]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" Jul 10 00:46:14.655382 ignition[855]: DEBUG : files: compiled without relabeling support, skipping Jul 10 00:46:14.659937 ignition[855]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Jul 10 00:46:14.659937 ignition[855]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Jul 10 00:46:14.664772 ignition[855]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Jul 10 00:46:14.664772 ignition[855]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Jul 10 00:46:14.668217 ignition[855]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Jul 10 00:46:14.668217 ignition[855]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/home/core/install.sh" Jul 10 00:46:14.668217 ignition[855]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/home/core/install.sh" Jul 10 00:46:14.668217 ignition[855]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/etc/flatcar/update.conf" Jul 10 00:46:14.668217 ignition[855]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/etc/flatcar/update.conf" Jul 10 00:46:14.668217 ignition[855]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.33.0-arm64.raw" Jul 10 00:46:14.668217 ignition[855]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.33.0-arm64.raw" Jul 10 00:46:14.668217 ignition[855]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.33.0-arm64.raw" Jul 10 00:46:14.668217 ignition[855]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET https://extensions.flatcar.org/extensions/kubernetes-v1.33.0-arm64.raw: attempt #1 Jul 10 00:46:14.666377 unknown[855]: wrote ssh authorized keys file for user: core Jul 10 00:46:14.997002 systemd-networkd[739]: eth0: Gained IPv6LL Jul 10 00:46:15.350896 ignition[855]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET result: OK Jul 10 00:46:15.774666 ignition[855]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.33.0-arm64.raw" Jul 10 00:46:15.774666 ignition[855]: INFO : files: op(7): [started] processing unit "coreos-metadata.service" Jul 10 00:46:15.778416 ignition[855]: INFO : files: op(7): op(8): [started] writing unit "coreos-metadata.service" at "/sysroot/etc/systemd/system/coreos-metadata.service" Jul 10 00:46:15.778416 ignition[855]: INFO : files: op(7): op(8): [finished] writing unit "coreos-metadata.service" at "/sysroot/etc/systemd/system/coreos-metadata.service" Jul 10 00:46:15.778416 ignition[855]: INFO : files: op(7): [finished] processing unit "coreos-metadata.service" Jul 10 00:46:15.778416 ignition[855]: INFO : files: op(9): [started] setting preset to disabled for "coreos-metadata.service" Jul 10 00:46:15.778416 ignition[855]: INFO : files: op(9): op(a): [started] removing enablement symlink(s) for "coreos-metadata.service" Jul 10 00:46:15.817619 ignition[855]: INFO : files: op(9): op(a): [finished] removing enablement symlink(s) for "coreos-metadata.service" Jul 10 00:46:15.819650 ignition[855]: INFO : files: op(9): [finished] setting preset to disabled for "coreos-metadata.service" Jul 10 00:46:15.819650 ignition[855]: INFO : files: createResultFile: createFiles: op(b): [started] writing file "/sysroot/etc/.ignition-result.json" Jul 10 00:46:15.819650 ignition[855]: INFO : files: createResultFile: createFiles: op(b): [finished] writing file "/sysroot/etc/.ignition-result.json" Jul 10 00:46:15.819650 ignition[855]: INFO : files: files passed Jul 10 00:46:15.819650 ignition[855]: INFO : Ignition finished successfully Jul 10 00:46:15.819000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:46:15.827000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:46:15.827000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:46:15.819287 systemd[1]: Finished ignition-files.service. Jul 10 00:46:15.832000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:46:15.821203 systemd[1]: Starting initrd-setup-root-after-ignition.service... Jul 10 00:46:15.823026 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Jul 10 00:46:15.837695 initrd-setup-root-after-ignition[880]: grep: /sysroot/usr/share/oem/oem-release: No such file or directory Jul 10 00:46:15.823767 systemd[1]: Starting ignition-quench.service... Jul 10 00:46:15.839967 initrd-setup-root-after-ignition[882]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Jul 10 00:46:15.826346 systemd[1]: ignition-quench.service: Deactivated successfully. Jul 10 00:46:15.826422 systemd[1]: Finished ignition-quench.service. Jul 10 00:46:15.831118 systemd[1]: Finished initrd-setup-root-after-ignition.service. Jul 10 00:46:15.833094 systemd[1]: Reached target ignition-complete.target. Jul 10 00:46:15.835146 systemd[1]: Starting initrd-parse-etc.service... Jul 10 00:46:15.849986 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Jul 10 00:46:15.850000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:46:15.850000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:46:15.850090 systemd[1]: Finished initrd-parse-etc.service. Jul 10 00:46:15.851130 systemd[1]: Reached target initrd-fs.target. Jul 10 00:46:15.852928 systemd[1]: Reached target initrd.target. Jul 10 00:46:15.854347 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Jul 10 00:46:15.855298 systemd[1]: Starting dracut-pre-pivot.service... Jul 10 00:46:15.869296 systemd[1]: Finished dracut-pre-pivot.service. Jul 10 00:46:15.870000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:46:15.871158 systemd[1]: Starting initrd-cleanup.service... Jul 10 00:46:15.881944 systemd[1]: Stopped target nss-lookup.target. Jul 10 00:46:15.882930 systemd[1]: Stopped target remote-cryptsetup.target. Jul 10 00:46:15.884623 systemd[1]: Stopped target timers.target. Jul 10 00:46:15.886006 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Jul 10 00:46:15.887000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:46:15.886140 systemd[1]: Stopped dracut-pre-pivot.service. Jul 10 00:46:15.887682 systemd[1]: Stopped target initrd.target. Jul 10 00:46:15.891301 systemd[1]: Stopped target basic.target. Jul 10 00:46:15.892579 systemd[1]: Stopped target ignition-complete.target. Jul 10 00:46:15.894087 systemd[1]: Stopped target ignition-diskful.target. Jul 10 00:46:15.895452 systemd[1]: Stopped target initrd-root-device.target. Jul 10 00:46:15.896915 systemd[1]: Stopped target remote-fs.target. Jul 10 00:46:15.898350 systemd[1]: Stopped target remote-fs-pre.target. Jul 10 00:46:15.899868 systemd[1]: Stopped target sysinit.target. Jul 10 00:46:15.901451 systemd[1]: Stopped target local-fs.target. Jul 10 00:46:15.902771 systemd[1]: Stopped target local-fs-pre.target. Jul 10 00:46:15.904084 systemd[1]: Stopped target swap.target. Jul 10 00:46:15.906000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:46:15.905303 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Jul 10 00:46:15.905431 systemd[1]: Stopped dracut-pre-mount.service. Jul 10 00:46:15.909000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:46:15.906879 systemd[1]: Stopped target cryptsetup.target. Jul 10 00:46:15.910000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:46:15.908016 systemd[1]: dracut-initqueue.service: Deactivated successfully. Jul 10 00:46:15.908120 systemd[1]: Stopped dracut-initqueue.service. Jul 10 00:46:15.909636 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Jul 10 00:46:15.909744 systemd[1]: Stopped ignition-fetch-offline.service. Jul 10 00:46:15.911114 systemd[1]: Stopped target paths.target. Jul 10 00:46:15.912330 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Jul 10 00:46:15.916688 systemd[1]: Stopped systemd-ask-password-console.path. Jul 10 00:46:15.917650 systemd[1]: Stopped target slices.target. Jul 10 00:46:15.919258 systemd[1]: Stopped target sockets.target. Jul 10 00:46:15.920673 systemd[1]: iscsid.socket: Deactivated successfully. Jul 10 00:46:15.923000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:46:15.920737 systemd[1]: Closed iscsid.socket. Jul 10 00:46:15.924000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:46:15.921968 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Jul 10 00:46:15.922077 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Jul 10 00:46:15.923530 systemd[1]: ignition-files.service: Deactivated successfully. Jul 10 00:46:15.923623 systemd[1]: Stopped ignition-files.service. Jul 10 00:46:15.925876 systemd[1]: Stopping ignition-mount.service... Jul 10 00:46:15.932712 ignition[895]: INFO : Ignition 2.14.0 Jul 10 00:46:15.932712 ignition[895]: INFO : Stage: umount Jul 10 00:46:15.932712 ignition[895]: INFO : no configs at "/usr/lib/ignition/base.d" Jul 10 00:46:15.932712 ignition[895]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" Jul 10 00:46:15.937000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:46:15.927604 systemd[1]: Stopping iscsiuio.service... Jul 10 00:46:15.939000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:46:15.940033 ignition[895]: INFO : umount: umount passed Jul 10 00:46:15.940033 ignition[895]: INFO : Ignition finished successfully Jul 10 00:46:15.930237 systemd[1]: Stopping sysroot-boot.service... Jul 10 00:46:15.943000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:46:15.936126 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Jul 10 00:46:15.936360 systemd[1]: Stopped systemd-udev-trigger.service. Jul 10 00:46:15.947000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:46:15.937357 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Jul 10 00:46:15.937455 systemd[1]: Stopped dracut-pre-trigger.service. Jul 10 00:46:15.941014 systemd[1]: iscsiuio.service: Deactivated successfully. Jul 10 00:46:15.954000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:46:15.941107 systemd[1]: Stopped iscsiuio.service. Jul 10 00:46:15.957000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:46:15.944873 systemd[1]: sysroot-boot.mount: Deactivated successfully. Jul 10 00:46:15.958000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:46:15.945384 systemd[1]: ignition-mount.service: Deactivated successfully. Jul 10 00:46:15.945477 systemd[1]: Stopped ignition-mount.service. Jul 10 00:46:15.947587 systemd[1]: Stopped target network.target. Jul 10 00:46:15.950559 systemd[1]: iscsiuio.socket: Deactivated successfully. Jul 10 00:46:15.965000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:46:15.965000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:46:15.950601 systemd[1]: Closed iscsiuio.socket. Jul 10 00:46:15.953393 systemd[1]: ignition-disks.service: Deactivated successfully. Jul 10 00:46:15.953460 systemd[1]: Stopped ignition-disks.service. Jul 10 00:46:15.954942 systemd[1]: ignition-kargs.service: Deactivated successfully. Jul 10 00:46:15.955011 systemd[1]: Stopped ignition-kargs.service. Jul 10 00:46:15.957483 systemd[1]: ignition-setup.service: Deactivated successfully. Jul 10 00:46:15.957530 systemd[1]: Stopped ignition-setup.service. Jul 10 00:46:15.960053 systemd[1]: Stopping systemd-networkd.service... Jul 10 00:46:15.962064 systemd[1]: Stopping systemd-resolved.service... Jul 10 00:46:15.974000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:46:15.965168 systemd[1]: initrd-cleanup.service: Deactivated successfully. Jul 10 00:46:15.965256 systemd[1]: Finished initrd-cleanup.service. Jul 10 00:46:15.973450 systemd[1]: systemd-resolved.service: Deactivated successfully. Jul 10 00:46:15.973560 systemd[1]: Stopped systemd-resolved.service. Jul 10 00:46:15.980548 systemd-networkd[739]: eth0: DHCPv6 lease lost Jul 10 00:46:15.981717 systemd[1]: systemd-networkd.service: Deactivated successfully. Jul 10 00:46:15.982000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:46:15.981827 systemd[1]: Stopped systemd-networkd.service. Jul 10 00:46:15.986000 audit: BPF prog-id=6 op=UNLOAD Jul 10 00:46:15.983322 systemd[1]: systemd-networkd.socket: Deactivated successfully. Jul 10 00:46:15.987000 audit: BPF prog-id=9 op=UNLOAD Jul 10 00:46:15.987000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:46:15.983349 systemd[1]: Closed systemd-networkd.socket. Jul 10 00:46:15.988000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:46:15.985511 systemd[1]: Stopping network-cleanup.service... Jul 10 00:46:15.991000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:46:15.986185 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Jul 10 00:46:15.986244 systemd[1]: Stopped parse-ip-for-networkd.service. Jul 10 00:46:15.987948 systemd[1]: systemd-sysctl.service: Deactivated successfully. Jul 10 00:46:15.987992 systemd[1]: Stopped systemd-sysctl.service. Jul 10 00:46:15.990187 systemd[1]: systemd-modules-load.service: Deactivated successfully. Jul 10 00:46:15.997000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:46:15.990231 systemd[1]: Stopped systemd-modules-load.service. Jul 10 00:46:15.999000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:46:15.993616 systemd[1]: Stopping systemd-udevd.service... Jul 10 00:46:15.996572 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Jul 10 00:46:15.997067 systemd[1]: systemd-udevd.service: Deactivated successfully. Jul 10 00:46:16.005000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:46:15.997181 systemd[1]: Stopped systemd-udevd.service. Jul 10 00:46:16.006000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:46:15.998832 systemd[1]: sysroot-boot.service: Deactivated successfully. Jul 10 00:46:16.008000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:46:15.998905 systemd[1]: Stopped sysroot-boot.service. Jul 10 00:46:16.009000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:46:16.001008 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Jul 10 00:46:16.001057 systemd[1]: Closed systemd-udevd-control.socket. Jul 10 00:46:16.002553 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Jul 10 00:46:16.014000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:46:16.002590 systemd[1]: Closed systemd-udevd-kernel.socket. Jul 10 00:46:16.015000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:46:16.004076 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Jul 10 00:46:16.016000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:46:16.004122 systemd[1]: Stopped dracut-pre-udev.service. Jul 10 00:46:16.005970 systemd[1]: dracut-cmdline.service: Deactivated successfully. Jul 10 00:46:16.019000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:46:16.006009 systemd[1]: Stopped dracut-cmdline.service. Jul 10 00:46:16.021000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:46:16.021000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:46:16.007459 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Jul 10 00:46:16.007593 systemd[1]: Stopped dracut-cmdline-ask.service. Jul 10 00:46:16.008900 systemd[1]: initrd-setup-root.service: Deactivated successfully. Jul 10 00:46:16.008945 systemd[1]: Stopped initrd-setup-root.service. Jul 10 00:46:16.011121 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Jul 10 00:46:16.012655 systemd[1]: systemd-tmpfiles-setup-dev.service: Deactivated successfully. Jul 10 00:46:16.012713 systemd[1]: Stopped systemd-tmpfiles-setup-dev.service. Jul 10 00:46:16.015083 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Jul 10 00:46:16.015122 systemd[1]: Stopped kmod-static-nodes.service. Jul 10 00:46:16.015983 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Jul 10 00:46:16.016020 systemd[1]: Stopped systemd-vconsole-setup.service. Jul 10 00:46:16.018134 systemd[1]: run-credentials-systemd\x2dtmpfiles\x2dsetup\x2ddev.service.mount: Deactivated successfully. Jul 10 00:46:16.018582 systemd[1]: network-cleanup.service: Deactivated successfully. Jul 10 00:46:16.018675 systemd[1]: Stopped network-cleanup.service. Jul 10 00:46:16.019937 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Jul 10 00:46:16.020014 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Jul 10 00:46:16.021663 systemd[1]: Reached target initrd-switch-root.target. Jul 10 00:46:16.023851 systemd[1]: Starting initrd-switch-root.service... Jul 10 00:46:16.030561 systemd[1]: Switching root. Jul 10 00:46:16.049117 iscsid[746]: iscsid shutting down. Jul 10 00:46:16.049915 systemd-journald[289]: Received SIGTERM from PID 1 (systemd). Jul 10 00:46:16.049967 systemd-journald[289]: Journal stopped Jul 10 00:46:18.119290 kernel: SELinux: Class mctp_socket not defined in policy. Jul 10 00:46:18.119338 kernel: SELinux: Class anon_inode not defined in policy. Jul 10 00:46:18.119357 kernel: SELinux: the above unknown classes and permissions will be allowed Jul 10 00:46:18.119367 kernel: SELinux: policy capability network_peer_controls=1 Jul 10 00:46:18.119377 kernel: SELinux: policy capability open_perms=1 Jul 10 00:46:18.119387 kernel: SELinux: policy capability extended_socket_class=1 Jul 10 00:46:18.119398 kernel: SELinux: policy capability always_check_network=0 Jul 10 00:46:18.119412 kernel: SELinux: policy capability cgroup_seclabel=1 Jul 10 00:46:18.119421 kernel: SELinux: policy capability nnp_nosuid_transition=1 Jul 10 00:46:18.119431 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Jul 10 00:46:18.119440 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Jul 10 00:46:18.119450 kernel: kauditd_printk_skb: 64 callbacks suppressed Jul 10 00:46:18.119460 kernel: audit: type=1403 audit(1752108376.147:75): auid=4294967295 ses=4294967295 lsm=selinux res=1 Jul 10 00:46:18.119471 systemd[1]: Successfully loaded SELinux policy in 36.187ms. Jul 10 00:46:18.119483 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 7.373ms. Jul 10 00:46:18.119518 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Jul 10 00:46:18.119530 systemd[1]: Detected virtualization kvm. Jul 10 00:46:18.119541 systemd[1]: Detected architecture arm64. Jul 10 00:46:18.119551 systemd[1]: Detected first boot. Jul 10 00:46:18.119562 systemd[1]: Initializing machine ID from VM UUID. Jul 10 00:46:18.119572 kernel: audit: type=1400 audit(1752108376.225:76): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Jul 10 00:46:18.119583 kernel: audit: type=1400 audit(1752108376.225:77): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Jul 10 00:46:18.119597 kernel: audit: type=1334 audit(1752108376.225:78): prog-id=10 op=LOAD Jul 10 00:46:18.119606 kernel: audit: type=1334 audit(1752108376.225:79): prog-id=10 op=UNLOAD Jul 10 00:46:18.119616 kernel: audit: type=1334 audit(1752108376.227:80): prog-id=11 op=LOAD Jul 10 00:46:18.119625 kernel: audit: type=1334 audit(1752108376.227:81): prog-id=11 op=UNLOAD Jul 10 00:46:18.119635 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). Jul 10 00:46:18.119646 kernel: audit: type=1400 audit(1752108376.278:82): avc: denied { associate } for pid=928 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Jul 10 00:46:18.119657 kernel: audit: type=1300 audit(1752108376.278:82): arch=c00000b7 syscall=5 success=yes exit=0 a0=40001c589c a1=40000c8de0 a2=40000cf0c0 a3=32 items=0 ppid=911 pid=928 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:46:18.119669 kernel: audit: type=1327 audit(1752108376.278:82): proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Jul 10 00:46:18.119680 systemd[1]: Populated /etc with preset unit settings. Jul 10 00:46:18.119691 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Jul 10 00:46:18.119701 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Jul 10 00:46:18.119713 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Jul 10 00:46:18.119723 systemd[1]: iscsid.service: Deactivated successfully. Jul 10 00:46:18.119735 systemd[1]: Stopped iscsid.service. Jul 10 00:46:18.119752 systemd[1]: initrd-switch-root.service: Deactivated successfully. Jul 10 00:46:18.119765 systemd[1]: Stopped initrd-switch-root.service. Jul 10 00:46:18.119776 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Jul 10 00:46:18.119787 systemd[1]: Created slice system-addon\x2dconfig.slice. Jul 10 00:46:18.119798 systemd[1]: Created slice system-addon\x2drun.slice. Jul 10 00:46:18.119809 systemd[1]: Created slice system-getty.slice. Jul 10 00:46:18.119819 systemd[1]: Created slice system-modprobe.slice. Jul 10 00:46:18.119832 systemd[1]: Created slice system-serial\x2dgetty.slice. Jul 10 00:46:18.119843 systemd[1]: Created slice system-system\x2dcloudinit.slice. Jul 10 00:46:18.119854 systemd[1]: Created slice system-systemd\x2dfsck.slice. Jul 10 00:46:18.119864 systemd[1]: Created slice user.slice. Jul 10 00:46:18.119874 systemd[1]: Started systemd-ask-password-console.path. Jul 10 00:46:18.119885 systemd[1]: Started systemd-ask-password-wall.path. Jul 10 00:46:18.119895 systemd[1]: Set up automount boot.automount. Jul 10 00:46:18.119907 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Jul 10 00:46:18.119917 systemd[1]: Stopped target initrd-switch-root.target. Jul 10 00:46:18.119927 systemd[1]: Stopped target initrd-fs.target. Jul 10 00:46:18.119938 systemd[1]: Stopped target initrd-root-fs.target. Jul 10 00:46:18.119948 systemd[1]: Reached target integritysetup.target. Jul 10 00:46:18.119958 systemd[1]: Reached target remote-cryptsetup.target. Jul 10 00:46:18.119968 systemd[1]: Reached target remote-fs.target. Jul 10 00:46:18.119980 systemd[1]: Reached target slices.target. Jul 10 00:46:18.119991 systemd[1]: Reached target swap.target. Jul 10 00:46:18.120002 systemd[1]: Reached target torcx.target. Jul 10 00:46:18.120012 systemd[1]: Reached target veritysetup.target. Jul 10 00:46:18.120022 systemd[1]: Listening on systemd-coredump.socket. Jul 10 00:46:18.120032 systemd[1]: Listening on systemd-initctl.socket. Jul 10 00:46:18.120042 systemd[1]: Listening on systemd-networkd.socket. Jul 10 00:46:18.120053 systemd[1]: Listening on systemd-udevd-control.socket. Jul 10 00:46:18.120063 systemd[1]: Listening on systemd-udevd-kernel.socket. Jul 10 00:46:18.120074 systemd[1]: Listening on systemd-userdbd.socket. Jul 10 00:46:18.120086 systemd[1]: Mounting dev-hugepages.mount... Jul 10 00:46:18.120096 systemd[1]: Mounting dev-mqueue.mount... Jul 10 00:46:18.120106 systemd[1]: Mounting media.mount... Jul 10 00:46:18.120116 systemd[1]: Mounting sys-kernel-debug.mount... Jul 10 00:46:18.120127 systemd[1]: Mounting sys-kernel-tracing.mount... Jul 10 00:46:18.120137 systemd[1]: Mounting tmp.mount... Jul 10 00:46:18.120147 systemd[1]: Starting flatcar-tmpfiles.service... Jul 10 00:46:18.120157 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Jul 10 00:46:18.120168 systemd[1]: Starting kmod-static-nodes.service... Jul 10 00:46:18.120179 systemd[1]: Starting modprobe@configfs.service... Jul 10 00:46:18.120189 systemd[1]: Starting modprobe@dm_mod.service... Jul 10 00:46:18.120200 systemd[1]: Starting modprobe@drm.service... Jul 10 00:46:18.120210 systemd[1]: Starting modprobe@efi_pstore.service... Jul 10 00:46:18.120220 systemd[1]: Starting modprobe@fuse.service... Jul 10 00:46:18.120230 systemd[1]: Starting modprobe@loop.service... Jul 10 00:46:18.120241 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Jul 10 00:46:18.120252 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Jul 10 00:46:18.120262 systemd[1]: Stopped systemd-fsck-root.service. Jul 10 00:46:18.120273 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Jul 10 00:46:18.120284 systemd[1]: Stopped systemd-fsck-usr.service. Jul 10 00:46:18.120294 systemd[1]: Stopped systemd-journald.service. Jul 10 00:46:18.120305 systemd[1]: Starting systemd-journald.service... Jul 10 00:46:18.120315 systemd[1]: Starting systemd-modules-load.service... Jul 10 00:46:18.120325 systemd[1]: Starting systemd-network-generator.service... Jul 10 00:46:18.120336 systemd[1]: Starting systemd-remount-fs.service... Jul 10 00:46:18.120346 systemd[1]: Starting systemd-udev-trigger.service... Jul 10 00:46:18.120356 systemd[1]: verity-setup.service: Deactivated successfully. Jul 10 00:46:18.120367 systemd[1]: Stopped verity-setup.service. Jul 10 00:46:18.120377 kernel: fuse: init (API version 7.34) Jul 10 00:46:18.120388 systemd[1]: Mounted dev-hugepages.mount. Jul 10 00:46:18.120401 systemd[1]: Mounted dev-mqueue.mount. Jul 10 00:46:18.120412 systemd[1]: Mounted media.mount. Jul 10 00:46:18.120422 systemd[1]: Mounted sys-kernel-debug.mount. Jul 10 00:46:18.120432 kernel: loop: module loaded Jul 10 00:46:18.120442 systemd[1]: Mounted sys-kernel-tracing.mount. Jul 10 00:46:18.120452 systemd[1]: Mounted tmp.mount. Jul 10 00:46:18.120462 systemd[1]: Finished kmod-static-nodes.service. Jul 10 00:46:18.120472 systemd[1]: modprobe@configfs.service: Deactivated successfully. Jul 10 00:46:18.120482 systemd[1]: Finished modprobe@configfs.service. Jul 10 00:46:18.120501 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Jul 10 00:46:18.120512 systemd[1]: Finished modprobe@dm_mod.service. Jul 10 00:46:18.120522 systemd[1]: modprobe@drm.service: Deactivated successfully. Jul 10 00:46:18.120532 systemd[1]: Finished modprobe@drm.service. Jul 10 00:46:18.120543 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Jul 10 00:46:18.120554 systemd[1]: Finished modprobe@efi_pstore.service. Jul 10 00:46:18.120564 systemd[1]: modprobe@fuse.service: Deactivated successfully. Jul 10 00:46:18.120575 systemd[1]: Finished modprobe@fuse.service. Jul 10 00:46:18.120586 systemd[1]: modprobe@loop.service: Deactivated successfully. Jul 10 00:46:18.120599 systemd-journald[990]: Journal started Jul 10 00:46:18.120638 systemd-journald[990]: Runtime Journal (/run/log/journal/f309801408194431aaf555492ae1024b) is 6.0M, max 48.7M, 42.6M free. Jul 10 00:46:16.147000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Jul 10 00:46:16.225000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Jul 10 00:46:16.225000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Jul 10 00:46:16.225000 audit: BPF prog-id=10 op=LOAD Jul 10 00:46:16.225000 audit: BPF prog-id=10 op=UNLOAD Jul 10 00:46:16.227000 audit: BPF prog-id=11 op=LOAD Jul 10 00:46:16.227000 audit: BPF prog-id=11 op=UNLOAD Jul 10 00:46:16.278000 audit[928]: AVC avc: denied { associate } for pid=928 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Jul 10 00:46:16.278000 audit[928]: SYSCALL arch=c00000b7 syscall=5 success=yes exit=0 a0=40001c589c a1=40000c8de0 a2=40000cf0c0 a3=32 items=0 ppid=911 pid=928 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:46:16.278000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Jul 10 00:46:16.279000 audit[928]: AVC avc: denied { associate } for pid=928 comm="torcx-generator" name="bin" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Jul 10 00:46:16.279000 audit[928]: SYSCALL arch=c00000b7 syscall=34 success=yes exit=0 a0=ffffffffffffff9c a1=40001c5975 a2=1ed a3=0 items=2 ppid=911 pid=928 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:46:16.279000 audit: CWD cwd="/" Jul 10 00:46:16.279000 audit: PATH item=0 name=(null) inode=2 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:46:16.279000 audit: PATH item=1 name=(null) inode=3 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:46:16.279000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Jul 10 00:46:17.966000 audit: BPF prog-id=12 op=LOAD Jul 10 00:46:17.966000 audit: BPF prog-id=3 op=UNLOAD Jul 10 00:46:17.967000 audit: BPF prog-id=13 op=LOAD Jul 10 00:46:17.967000 audit: BPF prog-id=14 op=LOAD Jul 10 00:46:17.967000 audit: BPF prog-id=4 op=UNLOAD Jul 10 00:46:17.967000 audit: BPF prog-id=5 op=UNLOAD Jul 10 00:46:17.967000 audit: BPF prog-id=15 op=LOAD Jul 10 00:46:17.967000 audit: BPF prog-id=12 op=UNLOAD Jul 10 00:46:17.967000 audit: BPF prog-id=16 op=LOAD Jul 10 00:46:17.967000 audit: BPF prog-id=17 op=LOAD Jul 10 00:46:17.967000 audit: BPF prog-id=13 op=UNLOAD Jul 10 00:46:17.967000 audit: BPF prog-id=14 op=UNLOAD Jul 10 00:46:17.968000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:46:17.971000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:46:17.974000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:46:17.974000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:46:17.980000 audit: BPF prog-id=15 op=UNLOAD Jul 10 00:46:18.064000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:46:18.065000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:46:18.067000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:46:18.067000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:46:18.068000 audit: BPF prog-id=18 op=LOAD Jul 10 00:46:18.068000 audit: BPF prog-id=19 op=LOAD Jul 10 00:46:18.068000 audit: BPF prog-id=20 op=LOAD Jul 10 00:46:18.068000 audit: BPF prog-id=16 op=UNLOAD Jul 10 00:46:18.068000 audit: BPF prog-id=17 op=UNLOAD Jul 10 00:46:18.091000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:46:18.104000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:46:18.107000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:46:18.107000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:46:18.109000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:46:18.109000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:46:18.112000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:46:18.112000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:46:18.115000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:46:18.115000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:46:18.117000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Jul 10 00:46:18.117000 audit[990]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=60 a0=6 a1=ffffd47ad740 a2=4000 a3=1 items=0 ppid=1 pid=990 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:46:18.117000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Jul 10 00:46:18.119000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:46:18.119000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:46:17.965487 systemd[1]: Queued start job for default target multi-user.target. Jul 10 00:46:18.122004 systemd[1]: Finished modprobe@loop.service. Jul 10 00:46:16.276622 /usr/lib/systemd/system-generators/torcx-generator[928]: time="2025-07-10T00:46:16Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" Jul 10 00:46:17.965523 systemd[1]: Unnecessary job was removed for dev-vda6.device. Jul 10 00:46:16.276929 /usr/lib/systemd/system-generators/torcx-generator[928]: time="2025-07-10T00:46:16Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Jul 10 00:46:17.968741 systemd[1]: systemd-journald.service: Deactivated successfully. Jul 10 00:46:16.276947 /usr/lib/systemd/system-generators/torcx-generator[928]: time="2025-07-10T00:46:16Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Jul 10 00:46:16.276978 /usr/lib/systemd/system-generators/torcx-generator[928]: time="2025-07-10T00:46:16Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Jul 10 00:46:16.276988 /usr/lib/systemd/system-generators/torcx-generator[928]: time="2025-07-10T00:46:16Z" level=debug msg="skipped missing lower profile" missing profile=oem Jul 10 00:46:16.277017 /usr/lib/systemd/system-generators/torcx-generator[928]: time="2025-07-10T00:46:16Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Jul 10 00:46:16.277028 /usr/lib/systemd/system-generators/torcx-generator[928]: time="2025-07-10T00:46:16Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Jul 10 00:46:18.122000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:46:18.122000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:46:16.277240 /usr/lib/systemd/system-generators/torcx-generator[928]: time="2025-07-10T00:46:16Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Jul 10 00:46:16.277272 /usr/lib/systemd/system-generators/torcx-generator[928]: time="2025-07-10T00:46:16Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Jul 10 00:46:16.277284 /usr/lib/systemd/system-generators/torcx-generator[928]: time="2025-07-10T00:46:16Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Jul 10 00:46:16.278104 /usr/lib/systemd/system-generators/torcx-generator[928]: time="2025-07-10T00:46:16Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Jul 10 00:46:16.278141 /usr/lib/systemd/system-generators/torcx-generator[928]: time="2025-07-10T00:46:16Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Jul 10 00:46:16.278159 /usr/lib/systemd/system-generators/torcx-generator[928]: time="2025-07-10T00:46:16Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.7: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.7 Jul 10 00:46:16.278173 /usr/lib/systemd/system-generators/torcx-generator[928]: time="2025-07-10T00:46:16Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Jul 10 00:46:16.278191 /usr/lib/systemd/system-generators/torcx-generator[928]: time="2025-07-10T00:46:16Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.7: no such file or directory" path=/var/lib/torcx/store/3510.3.7 Jul 10 00:46:16.278204 /usr/lib/systemd/system-generators/torcx-generator[928]: time="2025-07-10T00:46:16Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Jul 10 00:46:17.716640 /usr/lib/systemd/system-generators/torcx-generator[928]: time="2025-07-10T00:46:17Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Jul 10 00:46:17.716914 /usr/lib/systemd/system-generators/torcx-generator[928]: time="2025-07-10T00:46:17Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Jul 10 00:46:17.717008 /usr/lib/systemd/system-generators/torcx-generator[928]: time="2025-07-10T00:46:17Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Jul 10 00:46:17.717160 /usr/lib/systemd/system-generators/torcx-generator[928]: time="2025-07-10T00:46:17Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Jul 10 00:46:17.717209 /usr/lib/systemd/system-generators/torcx-generator[928]: time="2025-07-10T00:46:17Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Jul 10 00:46:17.717266 /usr/lib/systemd/system-generators/torcx-generator[928]: time="2025-07-10T00:46:17Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Jul 10 00:46:18.124085 systemd[1]: Started systemd-journald.service. Jul 10 00:46:18.124000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:46:18.124788 systemd[1]: Finished systemd-modules-load.service. Jul 10 00:46:18.125000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:46:18.126213 systemd[1]: Finished systemd-network-generator.service. Jul 10 00:46:18.127000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:46:18.127555 systemd[1]: Finished systemd-remount-fs.service. Jul 10 00:46:18.127000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:46:18.128932 systemd[1]: Reached target network-pre.target. Jul 10 00:46:18.130860 systemd[1]: Mounting sys-fs-fuse-connections.mount... Jul 10 00:46:18.133407 systemd[1]: Mounting sys-kernel-config.mount... Jul 10 00:46:18.134222 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Jul 10 00:46:18.136210 systemd[1]: Starting systemd-hwdb-update.service... Jul 10 00:46:18.137966 systemd[1]: Starting systemd-journal-flush.service... Jul 10 00:46:18.147636 systemd-journald[990]: Time spent on flushing to /var/log/journal/f309801408194431aaf555492ae1024b is 13.560ms for 973 entries. Jul 10 00:46:18.147636 systemd-journald[990]: System Journal (/var/log/journal/f309801408194431aaf555492ae1024b) is 8.0M, max 195.6M, 187.6M free. Jul 10 00:46:18.169901 systemd-journald[990]: Received client request to flush runtime journal. Jul 10 00:46:18.149000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:46:18.151000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:46:18.154000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:46:18.164000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:46:18.138947 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Jul 10 00:46:18.171000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:46:18.140153 systemd[1]: Starting systemd-random-seed.service... Jul 10 00:46:18.141138 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Jul 10 00:46:18.144287 systemd[1]: Starting systemd-sysctl.service... Jul 10 00:46:18.148277 systemd[1]: Finished flatcar-tmpfiles.service. Jul 10 00:46:18.176690 udevadm[1030]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation-early.service, lvm2-activation.service not to pull it in. Jul 10 00:46:18.150624 systemd[1]: Finished systemd-udev-trigger.service. Jul 10 00:46:18.151767 systemd[1]: Mounted sys-fs-fuse-connections.mount. Jul 10 00:46:18.152757 systemd[1]: Mounted sys-kernel-config.mount. Jul 10 00:46:18.153892 systemd[1]: Finished systemd-random-seed.service. Jul 10 00:46:18.155074 systemd[1]: Reached target first-boot-complete.target. Jul 10 00:46:18.157007 systemd[1]: Starting systemd-sysusers.service... Jul 10 00:46:18.159011 systemd[1]: Starting systemd-udev-settle.service... Jul 10 00:46:18.163854 systemd[1]: Finished systemd-sysctl.service. Jul 10 00:46:18.171007 systemd[1]: Finished systemd-journal-flush.service. Jul 10 00:46:18.176758 systemd[1]: Finished systemd-sysusers.service. Jul 10 00:46:18.177000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:46:18.178667 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Jul 10 00:46:18.194637 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Jul 10 00:46:18.195000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:46:18.506536 systemd[1]: Finished systemd-hwdb-update.service. Jul 10 00:46:18.506000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:46:18.507000 audit: BPF prog-id=21 op=LOAD Jul 10 00:46:18.507000 audit: BPF prog-id=22 op=LOAD Jul 10 00:46:18.507000 audit: BPF prog-id=7 op=UNLOAD Jul 10 00:46:18.507000 audit: BPF prog-id=8 op=UNLOAD Jul 10 00:46:18.508880 systemd[1]: Starting systemd-udevd.service... Jul 10 00:46:18.527512 systemd-udevd[1034]: Using default interface naming scheme 'v252'. Jul 10 00:46:18.540381 systemd[1]: Started systemd-udevd.service. Jul 10 00:46:18.540000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:46:18.541000 audit: BPF prog-id=23 op=LOAD Jul 10 00:46:18.544230 systemd[1]: Starting systemd-networkd.service... Jul 10 00:46:18.557000 audit: BPF prog-id=24 op=LOAD Jul 10 00:46:18.557000 audit: BPF prog-id=25 op=LOAD Jul 10 00:46:18.557000 audit: BPF prog-id=26 op=LOAD Jul 10 00:46:18.558433 systemd[1]: Starting systemd-userdbd.service... Jul 10 00:46:18.563300 systemd[1]: Condition check resulted in dev-ttyAMA0.device being skipped. Jul 10 00:46:18.594661 systemd[1]: Started systemd-userdbd.service. Jul 10 00:46:18.595000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:46:18.602403 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Jul 10 00:46:18.649647 systemd-networkd[1043]: lo: Link UP Jul 10 00:46:18.649657 systemd-networkd[1043]: lo: Gained carrier Jul 10 00:46:18.650062 systemd-networkd[1043]: Enumeration completed Jul 10 00:46:18.650165 systemd[1]: Started systemd-networkd.service. Jul 10 00:46:18.650000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:46:18.651393 systemd[1]: Finished systemd-udev-settle.service. Jul 10 00:46:18.652000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:46:18.653602 systemd[1]: Starting lvm2-activation-early.service... Jul 10 00:46:18.654222 systemd-networkd[1043]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Jul 10 00:46:18.655786 systemd-networkd[1043]: eth0: Link UP Jul 10 00:46:18.655796 systemd-networkd[1043]: eth0: Gained carrier Jul 10 00:46:18.666460 lvm[1067]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Jul 10 00:46:18.679316 systemd-networkd[1043]: eth0: DHCPv4 address 10.0.0.135/16, gateway 10.0.0.1 acquired from 10.0.0.1 Jul 10 00:46:18.691440 systemd[1]: Finished lvm2-activation-early.service. Jul 10 00:46:18.692000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:46:18.692532 systemd[1]: Reached target cryptsetup.target. Jul 10 00:46:18.694442 systemd[1]: Starting lvm2-activation.service... Jul 10 00:46:18.698694 lvm[1068]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Jul 10 00:46:18.723365 systemd[1]: Finished lvm2-activation.service. Jul 10 00:46:18.724000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:46:18.724375 systemd[1]: Reached target local-fs-pre.target. Jul 10 00:46:18.725244 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Jul 10 00:46:18.725277 systemd[1]: Reached target local-fs.target. Jul 10 00:46:18.726076 systemd[1]: Reached target machines.target. Jul 10 00:46:18.728012 systemd[1]: Starting ldconfig.service... Jul 10 00:46:18.728996 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Jul 10 00:46:18.729042 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Jul 10 00:46:18.730023 systemd[1]: Starting systemd-boot-update.service... Jul 10 00:46:18.731857 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Jul 10 00:46:18.734048 systemd[1]: Starting systemd-machine-id-commit.service... Jul 10 00:46:18.736699 systemd[1]: Starting systemd-sysext.service... Jul 10 00:46:18.737871 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1070 (bootctl) Jul 10 00:46:18.738869 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Jul 10 00:46:18.746973 systemd[1]: Unmounting usr-share-oem.mount... Jul 10 00:46:18.753914 systemd[1]: usr-share-oem.mount: Deactivated successfully. Jul 10 00:46:18.754124 systemd[1]: Unmounted usr-share-oem.mount. Jul 10 00:46:18.760968 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Jul 10 00:46:18.762000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:46:18.768529 kernel: loop0: detected capacity change from 0 to 211168 Jul 10 00:46:18.834391 systemd-fsck[1080]: fsck.fat 4.2 (2021-01-31) Jul 10 00:46:18.834391 systemd-fsck[1080]: /dev/vda1: 236 files, 117310/258078 clusters Jul 10 00:46:18.836525 kernel: squashfs: version 4.0 (2009/01/31) Phillip Lougher Jul 10 00:46:18.838000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:46:18.837126 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Jul 10 00:46:18.845841 systemd[1]: Finished systemd-machine-id-commit.service. Jul 10 00:46:18.846000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:46:18.855523 kernel: loop1: detected capacity change from 0 to 211168 Jul 10 00:46:18.863066 (sd-sysext)[1084]: Using extensions 'kubernetes'. Jul 10 00:46:18.863411 (sd-sysext)[1084]: Merged extensions into '/usr'. Jul 10 00:46:18.880144 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Jul 10 00:46:18.881488 systemd[1]: Starting modprobe@dm_mod.service... Jul 10 00:46:18.883506 systemd[1]: Starting modprobe@efi_pstore.service... Jul 10 00:46:18.885790 systemd[1]: Starting modprobe@loop.service... Jul 10 00:46:18.886602 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Jul 10 00:46:18.886760 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Jul 10 00:46:18.887704 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Jul 10 00:46:18.887837 systemd[1]: Finished modprobe@dm_mod.service. Jul 10 00:46:18.888000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:46:18.888000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:46:18.889344 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Jul 10 00:46:18.889459 systemd[1]: Finished modprobe@efi_pstore.service. Jul 10 00:46:18.890000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:46:18.890000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:46:18.890881 systemd[1]: modprobe@loop.service: Deactivated successfully. Jul 10 00:46:18.890985 systemd[1]: Finished modprobe@loop.service. Jul 10 00:46:18.891000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:46:18.891000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:46:18.892342 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Jul 10 00:46:18.892439 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Jul 10 00:46:18.949137 ldconfig[1069]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Jul 10 00:46:18.992209 systemd[1]: Finished ldconfig.service. Jul 10 00:46:18.992000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ldconfig comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:46:19.093350 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Jul 10 00:46:19.095198 systemd[1]: Mounting boot.mount... Jul 10 00:46:19.102250 systemd[1]: Mounting usr-share-oem.mount... Jul 10 00:46:19.108845 systemd[1]: Mounted usr-share-oem.mount. Jul 10 00:46:19.110704 systemd[1]: Finished systemd-sysext.service. Jul 10 00:46:19.111000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:46:19.120368 systemd[1]: Starting ensure-sysext.service... Jul 10 00:46:19.122514 systemd[1]: Starting systemd-tmpfiles-setup.service... Jul 10 00:46:19.126271 systemd[1]: Mounted boot.mount. Jul 10 00:46:19.135839 systemd-tmpfiles[1092]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Jul 10 00:46:19.137163 systemd[1]: Reloading. Jul 10 00:46:19.137567 systemd-tmpfiles[1092]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Jul 10 00:46:19.139202 systemd-tmpfiles[1092]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Jul 10 00:46:19.187995 /usr/lib/systemd/system-generators/torcx-generator[1112]: time="2025-07-10T00:46:19Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" Jul 10 00:46:19.188024 /usr/lib/systemd/system-generators/torcx-generator[1112]: time="2025-07-10T00:46:19Z" level=info msg="torcx already run" Jul 10 00:46:19.246077 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Jul 10 00:46:19.246095 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Jul 10 00:46:19.262076 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Jul 10 00:46:19.306000 audit: BPF prog-id=27 op=LOAD Jul 10 00:46:19.306000 audit: BPF prog-id=24 op=UNLOAD Jul 10 00:46:19.306000 audit: BPF prog-id=28 op=LOAD Jul 10 00:46:19.306000 audit: BPF prog-id=29 op=LOAD Jul 10 00:46:19.306000 audit: BPF prog-id=25 op=UNLOAD Jul 10 00:46:19.306000 audit: BPF prog-id=26 op=UNLOAD Jul 10 00:46:19.307000 audit: BPF prog-id=30 op=LOAD Jul 10 00:46:19.307000 audit: BPF prog-id=31 op=LOAD Jul 10 00:46:19.307000 audit: BPF prog-id=21 op=UNLOAD Jul 10 00:46:19.307000 audit: BPF prog-id=22 op=UNLOAD Jul 10 00:46:19.307000 audit: BPF prog-id=32 op=LOAD Jul 10 00:46:19.307000 audit: BPF prog-id=18 op=UNLOAD Jul 10 00:46:19.307000 audit: BPF prog-id=33 op=LOAD Jul 10 00:46:19.307000 audit: BPF prog-id=34 op=LOAD Jul 10 00:46:19.307000 audit: BPF prog-id=19 op=UNLOAD Jul 10 00:46:19.307000 audit: BPF prog-id=20 op=UNLOAD Jul 10 00:46:19.309000 audit: BPF prog-id=35 op=LOAD Jul 10 00:46:19.309000 audit: BPF prog-id=23 op=UNLOAD Jul 10 00:46:19.312031 systemd[1]: Finished systemd-boot-update.service. Jul 10 00:46:19.312000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:46:19.314000 systemd[1]: Finished systemd-tmpfiles-setup.service. Jul 10 00:46:19.314000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:46:19.318178 systemd[1]: Starting audit-rules.service... Jul 10 00:46:19.320005 systemd[1]: Starting clean-ca-certificates.service... Jul 10 00:46:19.321929 systemd[1]: Starting systemd-journal-catalog-update.service... Jul 10 00:46:19.323000 audit: BPF prog-id=36 op=LOAD Jul 10 00:46:19.324595 systemd[1]: Starting systemd-resolved.service... Jul 10 00:46:19.326000 audit: BPF prog-id=37 op=LOAD Jul 10 00:46:19.330936 systemd[1]: Starting systemd-timesyncd.service... Jul 10 00:46:19.334576 systemd[1]: Starting systemd-update-utmp.service... Jul 10 00:46:19.340840 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Jul 10 00:46:19.342013 systemd[1]: Starting modprobe@dm_mod.service... Jul 10 00:46:19.344008 systemd[1]: Starting modprobe@efi_pstore.service... Jul 10 00:46:19.346060 systemd[1]: Starting modprobe@loop.service... Jul 10 00:46:19.346000 audit[1156]: SYSTEM_BOOT pid=1156 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Jul 10 00:46:19.346879 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Jul 10 00:46:19.347014 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Jul 10 00:46:19.347896 systemd[1]: Finished clean-ca-certificates.service. Jul 10 00:46:19.348000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:46:19.349295 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Jul 10 00:46:19.349403 systemd[1]: Finished modprobe@dm_mod.service. Jul 10 00:46:19.350000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:46:19.350000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:46:19.350899 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Jul 10 00:46:19.351005 systemd[1]: Finished modprobe@efi_pstore.service. Jul 10 00:46:19.351000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:46:19.351000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:46:19.353000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:46:19.353000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:46:19.352279 systemd[1]: modprobe@loop.service: Deactivated successfully. Jul 10 00:46:19.352380 systemd[1]: Finished modprobe@loop.service. Jul 10 00:46:19.356215 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Jul 10 00:46:19.357603 systemd[1]: Starting modprobe@dm_mod.service... Jul 10 00:46:19.359439 systemd[1]: Starting modprobe@efi_pstore.service... Jul 10 00:46:19.362111 systemd[1]: Starting modprobe@loop.service... Jul 10 00:46:19.362998 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Jul 10 00:46:19.363174 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Jul 10 00:46:19.363319 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Jul 10 00:46:19.364459 systemd[1]: Finished systemd-journal-catalog-update.service. Jul 10 00:46:19.365000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:46:19.366069 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Jul 10 00:46:19.366175 systemd[1]: Finished modprobe@dm_mod.service. Jul 10 00:46:19.367442 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Jul 10 00:46:19.367560 systemd[1]: Finished modprobe@efi_pstore.service. Jul 10 00:46:19.366000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:46:19.366000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:46:19.367000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:46:19.368000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:46:19.368834 systemd[1]: modprobe@loop.service: Deactivated successfully. Jul 10 00:46:19.368943 systemd[1]: Finished modprobe@loop.service. Jul 10 00:46:19.369000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:46:19.369000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:46:19.372285 systemd[1]: Finished systemd-update-utmp.service. Jul 10 00:46:19.373000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:46:19.374693 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Jul 10 00:46:19.375678 systemd[1]: Starting modprobe@dm_mod.service... Jul 10 00:46:19.377331 systemd[1]: Starting modprobe@drm.service... Jul 10 00:46:19.379006 systemd[1]: Starting modprobe@efi_pstore.service... Jul 10 00:46:19.380666 systemd[1]: Starting modprobe@loop.service... Jul 10 00:46:19.381450 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Jul 10 00:46:19.381525 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Jul 10 00:46:19.382415 systemd[1]: Starting systemd-networkd-wait-online.service... Jul 10 00:46:19.384459 systemd[1]: Starting systemd-update-done.service... Jul 10 00:46:19.385391 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Jul 10 00:46:19.386000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ensure-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:46:19.387000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:46:19.387000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:46:19.389000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:46:19.389000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:46:19.386031 systemd[1]: Finished ensure-sysext.service. Jul 10 00:46:19.387114 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Jul 10 00:46:19.387230 systemd[1]: Finished modprobe@dm_mod.service. Jul 10 00:46:19.388347 systemd[1]: modprobe@drm.service: Deactivated successfully. Jul 10 00:46:19.388451 systemd[1]: Finished modprobe@drm.service. Jul 10 00:46:19.389514 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Jul 10 00:46:19.389620 systemd[1]: Finished modprobe@efi_pstore.service. Jul 10 00:46:19.390228 augenrules[1180]: No rules Jul 10 00:46:19.389000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Jul 10 00:46:19.389000 audit[1180]: SYSCALL arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=fffff5d7ce40 a2=420 a3=0 items=0 ppid=1150 pid=1180 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:46:19.389000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Jul 10 00:46:19.390793 systemd[1]: modprobe@loop.service: Deactivated successfully. Jul 10 00:46:19.390904 systemd[1]: Finished modprobe@loop.service. Jul 10 00:46:19.391955 systemd[1]: Finished audit-rules.service. Jul 10 00:46:19.392924 systemd[1]: Finished systemd-update-done.service. Jul 10 00:46:19.395164 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Jul 10 00:46:19.395206 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Jul 10 00:46:19.407056 systemd[1]: Started systemd-timesyncd.service. Jul 10 00:46:19.407983 systemd-timesyncd[1155]: Contacted time server 10.0.0.1:123 (10.0.0.1). Jul 10 00:46:19.408256 systemd-timesyncd[1155]: Initial clock synchronization to Thu 2025-07-10 00:46:19.048699 UTC. Jul 10 00:46:19.408300 systemd[1]: Reached target time-set.target. Jul 10 00:46:19.414328 systemd-resolved[1154]: Positive Trust Anchors: Jul 10 00:46:19.414342 systemd-resolved[1154]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Jul 10 00:46:19.414369 systemd-resolved[1154]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Jul 10 00:46:19.425629 systemd-resolved[1154]: Defaulting to hostname 'linux'. Jul 10 00:46:19.427078 systemd[1]: Started systemd-resolved.service. Jul 10 00:46:19.427958 systemd[1]: Reached target network.target. Jul 10 00:46:19.428700 systemd[1]: Reached target nss-lookup.target. Jul 10 00:46:19.429457 systemd[1]: Reached target sysinit.target. Jul 10 00:46:19.430295 systemd[1]: Started motdgen.path. Jul 10 00:46:19.431025 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Jul 10 00:46:19.432219 systemd[1]: Started logrotate.timer. Jul 10 00:46:19.433080 systemd[1]: Started mdadm.timer. Jul 10 00:46:19.433755 systemd[1]: Started systemd-tmpfiles-clean.timer. Jul 10 00:46:19.434555 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Jul 10 00:46:19.434587 systemd[1]: Reached target paths.target. Jul 10 00:46:19.435391 systemd[1]: Reached target timers.target. Jul 10 00:46:19.436453 systemd[1]: Listening on dbus.socket. Jul 10 00:46:19.438229 systemd[1]: Starting docker.socket... Jul 10 00:46:19.441245 systemd[1]: Listening on sshd.socket. Jul 10 00:46:19.442094 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Jul 10 00:46:19.442577 systemd[1]: Listening on docker.socket. Jul 10 00:46:19.443387 systemd[1]: Reached target sockets.target. Jul 10 00:46:19.444223 systemd[1]: Reached target basic.target. Jul 10 00:46:19.445009 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Jul 10 00:46:19.445077 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Jul 10 00:46:19.445971 systemd[1]: Starting containerd.service... Jul 10 00:46:19.447761 systemd[1]: Starting dbus.service... Jul 10 00:46:19.449378 systemd[1]: Starting enable-oem-cloudinit.service... Jul 10 00:46:19.451283 systemd[1]: Starting extend-filesystems.service... Jul 10 00:46:19.452157 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Jul 10 00:46:19.453319 systemd[1]: Starting motdgen.service... Jul 10 00:46:19.455781 systemd[1]: Starting ssh-key-proc-cmdline.service... Jul 10 00:46:19.457706 systemd[1]: Starting sshd-keygen.service... Jul 10 00:46:19.460804 jq[1192]: false Jul 10 00:46:19.463511 systemd[1]: Starting systemd-logind.service... Jul 10 00:46:19.464338 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Jul 10 00:46:19.464511 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). Jul 10 00:46:19.465133 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Jul 10 00:46:19.466022 systemd[1]: Starting update-engine.service... Jul 10 00:46:19.468067 systemd[1]: Starting update-ssh-keys-after-ignition.service... Jul 10 00:46:19.471127 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Jul 10 00:46:19.471337 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Jul 10 00:46:19.471765 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Jul 10 00:46:19.471940 systemd[1]: Finished ssh-key-proc-cmdline.service. Jul 10 00:46:19.472563 jq[1209]: true Jul 10 00:46:19.483438 systemd[1]: motdgen.service: Deactivated successfully. Jul 10 00:46:19.483612 systemd[1]: Finished motdgen.service. Jul 10 00:46:19.484234 jq[1212]: true Jul 10 00:46:19.487744 extend-filesystems[1193]: Found loop1 Jul 10 00:46:19.488758 extend-filesystems[1193]: Found vda Jul 10 00:46:19.488758 extend-filesystems[1193]: Found vda1 Jul 10 00:46:19.488758 extend-filesystems[1193]: Found vda2 Jul 10 00:46:19.488758 extend-filesystems[1193]: Found vda3 Jul 10 00:46:19.488758 extend-filesystems[1193]: Found usr Jul 10 00:46:19.488758 extend-filesystems[1193]: Found vda4 Jul 10 00:46:19.488758 extend-filesystems[1193]: Found vda6 Jul 10 00:46:19.488758 extend-filesystems[1193]: Found vda7 Jul 10 00:46:19.488758 extend-filesystems[1193]: Found vda9 Jul 10 00:46:19.488758 extend-filesystems[1193]: Checking size of /dev/vda9 Jul 10 00:46:19.499933 systemd[1]: Started dbus.service. Jul 10 00:46:19.499745 dbus-daemon[1191]: [system] SELinux support is enabled Jul 10 00:46:19.502776 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Jul 10 00:46:19.502801 systemd[1]: Reached target system-config.target. Jul 10 00:46:19.503753 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Jul 10 00:46:19.503773 systemd[1]: Reached target user-config.target. Jul 10 00:46:19.523315 extend-filesystems[1193]: Resized partition /dev/vda9 Jul 10 00:46:19.526007 extend-filesystems[1236]: resize2fs 1.46.5 (30-Dec-2021) Jul 10 00:46:19.540524 kernel: EXT4-fs (vda9): resizing filesystem from 553472 to 1864699 blocks Jul 10 00:46:19.574932 systemd-logind[1204]: Watching system buttons on /dev/input/event0 (Power Button) Jul 10 00:46:19.575142 systemd-logind[1204]: New seat seat0. Jul 10 00:46:19.578050 systemd[1]: Started systemd-logind.service. Jul 10 00:46:19.589092 update_engine[1208]: I0710 00:46:19.587955 1208 main.cc:92] Flatcar Update Engine starting Jul 10 00:46:19.606405 kernel: EXT4-fs (vda9): resized filesystem to 1864699 Jul 10 00:46:19.601621 systemd[1]: Started update-engine.service. Jul 10 00:46:19.606580 update_engine[1208]: I0710 00:46:19.601672 1208 update_check_scheduler.cc:74] Next update check in 7m40s Jul 10 00:46:19.604975 systemd[1]: Started locksmithd.service. Jul 10 00:46:19.606882 extend-filesystems[1236]: Filesystem at /dev/vda9 is mounted on /; on-line resizing required Jul 10 00:46:19.606882 extend-filesystems[1236]: old_desc_blocks = 1, new_desc_blocks = 1 Jul 10 00:46:19.606882 extend-filesystems[1236]: The filesystem on /dev/vda9 is now 1864699 (4k) blocks long. Jul 10 00:46:19.611308 extend-filesystems[1193]: Resized filesystem in /dev/vda9 Jul 10 00:46:19.607852 systemd[1]: extend-filesystems.service: Deactivated successfully. Jul 10 00:46:19.608131 systemd[1]: Finished extend-filesystems.service. Jul 10 00:46:19.613183 bash[1237]: Updated "/home/core/.ssh/authorized_keys" Jul 10 00:46:19.613840 systemd[1]: Finished update-ssh-keys-after-ignition.service. Jul 10 00:46:19.620012 env[1213]: time="2025-07-10T00:46:19.619833200Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Jul 10 00:46:19.643395 env[1213]: time="2025-07-10T00:46:19.643341400Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Jul 10 00:46:19.643545 env[1213]: time="2025-07-10T00:46:19.643527840Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Jul 10 00:46:19.645678 env[1213]: time="2025-07-10T00:46:19.645620760Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.186-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Jul 10 00:46:19.645678 env[1213]: time="2025-07-10T00:46:19.645667920Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Jul 10 00:46:19.645935 env[1213]: time="2025-07-10T00:46:19.645898520Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Jul 10 00:46:19.645935 env[1213]: time="2025-07-10T00:46:19.645924440Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Jul 10 00:46:19.645990 env[1213]: time="2025-07-10T00:46:19.645939040Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Jul 10 00:46:19.645990 env[1213]: time="2025-07-10T00:46:19.645949120Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Jul 10 00:46:19.646042 env[1213]: time="2025-07-10T00:46:19.646026280Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Jul 10 00:46:19.646262 env[1213]: time="2025-07-10T00:46:19.646233320Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Jul 10 00:46:19.646375 env[1213]: time="2025-07-10T00:46:19.646356320Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Jul 10 00:46:19.646398 env[1213]: time="2025-07-10T00:46:19.646376600Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Jul 10 00:46:19.646451 env[1213]: time="2025-07-10T00:46:19.646434480Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Jul 10 00:46:19.646487 env[1213]: time="2025-07-10T00:46:19.646452040Z" level=info msg="metadata content store policy set" policy=shared Jul 10 00:46:19.649898 env[1213]: time="2025-07-10T00:46:19.649870000Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Jul 10 00:46:19.649958 env[1213]: time="2025-07-10T00:46:19.649904200Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Jul 10 00:46:19.649958 env[1213]: time="2025-07-10T00:46:19.649919840Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Jul 10 00:46:19.649958 env[1213]: time="2025-07-10T00:46:19.649953360Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Jul 10 00:46:19.650029 env[1213]: time="2025-07-10T00:46:19.649969960Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Jul 10 00:46:19.650029 env[1213]: time="2025-07-10T00:46:19.649983760Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Jul 10 00:46:19.650029 env[1213]: time="2025-07-10T00:46:19.649995520Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Jul 10 00:46:19.650337 env[1213]: time="2025-07-10T00:46:19.650311720Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Jul 10 00:46:19.650337 env[1213]: time="2025-07-10T00:46:19.650333920Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Jul 10 00:46:19.650398 env[1213]: time="2025-07-10T00:46:19.650347960Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Jul 10 00:46:19.650398 env[1213]: time="2025-07-10T00:46:19.650361560Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Jul 10 00:46:19.650398 env[1213]: time="2025-07-10T00:46:19.650375520Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Jul 10 00:46:19.650560 env[1213]: time="2025-07-10T00:46:19.650526440Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Jul 10 00:46:19.650629 env[1213]: time="2025-07-10T00:46:19.650614640Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Jul 10 00:46:19.650860 env[1213]: time="2025-07-10T00:46:19.650840320Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Jul 10 00:46:19.650898 env[1213]: time="2025-07-10T00:46:19.650872360Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Jul 10 00:46:19.650898 env[1213]: time="2025-07-10T00:46:19.650887640Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Jul 10 00:46:19.651011 env[1213]: time="2025-07-10T00:46:19.650994560Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Jul 10 00:46:19.651011 env[1213]: time="2025-07-10T00:46:19.651010240Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Jul 10 00:46:19.651065 env[1213]: time="2025-07-10T00:46:19.651022640Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Jul 10 00:46:19.651065 env[1213]: time="2025-07-10T00:46:19.651034520Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Jul 10 00:46:19.651065 env[1213]: time="2025-07-10T00:46:19.651046400Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Jul 10 00:46:19.651065 env[1213]: time="2025-07-10T00:46:19.651058200Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Jul 10 00:46:19.651146 env[1213]: time="2025-07-10T00:46:19.651069320Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Jul 10 00:46:19.651146 env[1213]: time="2025-07-10T00:46:19.651081160Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Jul 10 00:46:19.651146 env[1213]: time="2025-07-10T00:46:19.651093600Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Jul 10 00:46:19.651262 env[1213]: time="2025-07-10T00:46:19.651209080Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Jul 10 00:46:19.651262 env[1213]: time="2025-07-10T00:46:19.651230920Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Jul 10 00:46:19.651262 env[1213]: time="2025-07-10T00:46:19.651244680Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Jul 10 00:46:19.651262 env[1213]: time="2025-07-10T00:46:19.651257640Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Jul 10 00:46:19.651346 env[1213]: time="2025-07-10T00:46:19.651272440Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Jul 10 00:46:19.651346 env[1213]: time="2025-07-10T00:46:19.651283480Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Jul 10 00:46:19.651346 env[1213]: time="2025-07-10T00:46:19.651300040Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Jul 10 00:46:19.651346 env[1213]: time="2025-07-10T00:46:19.651333280Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Jul 10 00:46:19.651593 env[1213]: time="2025-07-10T00:46:19.651545640Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Jul 10 00:46:19.652156 env[1213]: time="2025-07-10T00:46:19.651602320Z" level=info msg="Connect containerd service" Jul 10 00:46:19.652156 env[1213]: time="2025-07-10T00:46:19.651633160Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Jul 10 00:46:19.652265 env[1213]: time="2025-07-10T00:46:19.652236800Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Jul 10 00:46:19.652505 env[1213]: time="2025-07-10T00:46:19.652456000Z" level=info msg="Start subscribing containerd event" Jul 10 00:46:19.652542 env[1213]: time="2025-07-10T00:46:19.652524000Z" level=info msg="Start recovering state" Jul 10 00:46:19.652630 env[1213]: time="2025-07-10T00:46:19.652613720Z" level=info msg="Start event monitor" Jul 10 00:46:19.652661 env[1213]: time="2025-07-10T00:46:19.652641560Z" level=info msg="Start snapshots syncer" Jul 10 00:46:19.652661 env[1213]: time="2025-07-10T00:46:19.652654640Z" level=info msg="Start cni network conf syncer for default" Jul 10 00:46:19.652730 env[1213]: time="2025-07-10T00:46:19.652662560Z" level=info msg="Start streaming server" Jul 10 00:46:19.652765 env[1213]: time="2025-07-10T00:46:19.652621000Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Jul 10 00:46:19.652816 env[1213]: time="2025-07-10T00:46:19.652800320Z" level=info msg=serving... address=/run/containerd/containerd.sock Jul 10 00:46:19.652872 env[1213]: time="2025-07-10T00:46:19.652858960Z" level=info msg="containerd successfully booted in 0.033795s" Jul 10 00:46:19.652925 systemd[1]: Started containerd.service. Jul 10 00:46:19.659838 locksmithd[1240]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Jul 10 00:46:20.562671 systemd-networkd[1043]: eth0: Gained IPv6LL Jul 10 00:46:20.564441 systemd[1]: Finished systemd-networkd-wait-online.service. Jul 10 00:46:20.565679 systemd[1]: Reached target network-online.target. Jul 10 00:46:20.567827 systemd[1]: Starting kubelet.service... Jul 10 00:46:20.907024 sshd_keygen[1210]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Jul 10 00:46:20.923990 systemd[1]: Finished sshd-keygen.service. Jul 10 00:46:20.926136 systemd[1]: Starting issuegen.service... Jul 10 00:46:20.930513 systemd[1]: issuegen.service: Deactivated successfully. Jul 10 00:46:20.930646 systemd[1]: Finished issuegen.service. Jul 10 00:46:20.932646 systemd[1]: Starting systemd-user-sessions.service... Jul 10 00:46:20.938325 systemd[1]: Finished systemd-user-sessions.service. Jul 10 00:46:20.940337 systemd[1]: Started getty@tty1.service. Jul 10 00:46:20.942211 systemd[1]: Started serial-getty@ttyAMA0.service. Jul 10 00:46:20.943279 systemd[1]: Reached target getty.target. Jul 10 00:46:21.162858 systemd[1]: Started kubelet.service. Jul 10 00:46:21.164130 systemd[1]: Reached target multi-user.target. Jul 10 00:46:21.166316 systemd[1]: Starting systemd-update-utmp-runlevel.service... Jul 10 00:46:21.173430 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Jul 10 00:46:21.173598 systemd[1]: Finished systemd-update-utmp-runlevel.service. Jul 10 00:46:21.174751 systemd[1]: Startup finished in 572ms (kernel) + 4.527s (initrd) + 5.079s (userspace) = 10.179s. Jul 10 00:46:21.612078 kubelet[1268]: E0710 00:46:21.611966 1268 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Jul 10 00:46:21.613869 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Jul 10 00:46:21.613990 systemd[1]: kubelet.service: Failed with result 'exit-code'. Jul 10 00:46:24.469964 systemd[1]: Created slice system-sshd.slice. Jul 10 00:46:24.470967 systemd[1]: Started sshd@0-10.0.0.135:22-10.0.0.1:33894.service. Jul 10 00:46:24.517629 sshd[1277]: Accepted publickey for core from 10.0.0.1 port 33894 ssh2: RSA SHA256:qOVwIcEhxIMbnnVzVACNg4ZPFMKwsyA0M9qFZXlj7es Jul 10 00:46:24.524233 sshd[1277]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 10 00:46:24.533381 systemd[1]: Created slice user-500.slice. Jul 10 00:46:24.534530 systemd[1]: Starting user-runtime-dir@500.service... Jul 10 00:46:24.536197 systemd-logind[1204]: New session 1 of user core. Jul 10 00:46:24.542956 systemd[1]: Finished user-runtime-dir@500.service. Jul 10 00:46:24.544178 systemd[1]: Starting user@500.service... Jul 10 00:46:24.547141 (systemd)[1280]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Jul 10 00:46:24.606786 systemd[1280]: Queued start job for default target default.target. Jul 10 00:46:24.607258 systemd[1280]: Reached target paths.target. Jul 10 00:46:24.607289 systemd[1280]: Reached target sockets.target. Jul 10 00:46:24.607299 systemd[1280]: Reached target timers.target. Jul 10 00:46:24.607309 systemd[1280]: Reached target basic.target. Jul 10 00:46:24.607344 systemd[1280]: Reached target default.target. Jul 10 00:46:24.607366 systemd[1280]: Startup finished in 54ms. Jul 10 00:46:24.607568 systemd[1]: Started user@500.service. Jul 10 00:46:24.608553 systemd[1]: Started session-1.scope. Jul 10 00:46:24.658345 systemd[1]: Started sshd@1-10.0.0.135:22-10.0.0.1:33898.service. Jul 10 00:46:24.708267 sshd[1289]: Accepted publickey for core from 10.0.0.1 port 33898 ssh2: RSA SHA256:qOVwIcEhxIMbnnVzVACNg4ZPFMKwsyA0M9qFZXlj7es Jul 10 00:46:24.709838 sshd[1289]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 10 00:46:24.716991 systemd-logind[1204]: New session 2 of user core. Jul 10 00:46:24.718147 systemd[1]: Started session-2.scope. Jul 10 00:46:24.773052 sshd[1289]: pam_unix(sshd:session): session closed for user core Jul 10 00:46:24.777127 systemd[1]: sshd@1-10.0.0.135:22-10.0.0.1:33898.service: Deactivated successfully. Jul 10 00:46:24.777765 systemd[1]: session-2.scope: Deactivated successfully. Jul 10 00:46:24.778295 systemd-logind[1204]: Session 2 logged out. Waiting for processes to exit. Jul 10 00:46:24.779344 systemd[1]: Started sshd@2-10.0.0.135:22-10.0.0.1:33904.service. Jul 10 00:46:24.780009 systemd-logind[1204]: Removed session 2. Jul 10 00:46:24.820233 sshd[1295]: Accepted publickey for core from 10.0.0.1 port 33904 ssh2: RSA SHA256:qOVwIcEhxIMbnnVzVACNg4ZPFMKwsyA0M9qFZXlj7es Jul 10 00:46:24.821422 sshd[1295]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 10 00:46:24.824669 systemd-logind[1204]: New session 3 of user core. Jul 10 00:46:24.825453 systemd[1]: Started session-3.scope. Jul 10 00:46:24.873157 sshd[1295]: pam_unix(sshd:session): session closed for user core Jul 10 00:46:24.876431 systemd[1]: sshd@2-10.0.0.135:22-10.0.0.1:33904.service: Deactivated successfully. Jul 10 00:46:24.877078 systemd[1]: session-3.scope: Deactivated successfully. Jul 10 00:46:24.877594 systemd-logind[1204]: Session 3 logged out. Waiting for processes to exit. Jul 10 00:46:24.878605 systemd[1]: Started sshd@3-10.0.0.135:22-10.0.0.1:33908.service. Jul 10 00:46:24.879226 systemd-logind[1204]: Removed session 3. Jul 10 00:46:24.918863 sshd[1301]: Accepted publickey for core from 10.0.0.1 port 33908 ssh2: RSA SHA256:qOVwIcEhxIMbnnVzVACNg4ZPFMKwsyA0M9qFZXlj7es Jul 10 00:46:24.920009 sshd[1301]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 10 00:46:24.923308 systemd-logind[1204]: New session 4 of user core. Jul 10 00:46:24.924074 systemd[1]: Started session-4.scope. Jul 10 00:46:24.976377 sshd[1301]: pam_unix(sshd:session): session closed for user core Jul 10 00:46:24.980180 systemd[1]: sshd@3-10.0.0.135:22-10.0.0.1:33908.service: Deactivated successfully. Jul 10 00:46:24.980860 systemd[1]: session-4.scope: Deactivated successfully. Jul 10 00:46:24.981410 systemd-logind[1204]: Session 4 logged out. Waiting for processes to exit. Jul 10 00:46:24.982595 systemd[1]: Started sshd@4-10.0.0.135:22-10.0.0.1:33912.service. Jul 10 00:46:24.983290 systemd-logind[1204]: Removed session 4. Jul 10 00:46:25.023094 sshd[1307]: Accepted publickey for core from 10.0.0.1 port 33912 ssh2: RSA SHA256:qOVwIcEhxIMbnnVzVACNg4ZPFMKwsyA0M9qFZXlj7es Jul 10 00:46:25.024408 sshd[1307]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 10 00:46:25.028113 systemd-logind[1204]: New session 5 of user core. Jul 10 00:46:25.028945 systemd[1]: Started session-5.scope. Jul 10 00:46:25.088143 sudo[1310]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Jul 10 00:46:25.088350 sudo[1310]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Jul 10 00:46:25.104665 dbus-daemon[1191]: avc: received setenforce notice (enforcing=1) Jul 10 00:46:25.105625 sudo[1310]: pam_unix(sudo:session): session closed for user root Jul 10 00:46:25.108000 sshd[1307]: pam_unix(sshd:session): session closed for user core Jul 10 00:46:25.111001 systemd[1]: sshd@4-10.0.0.135:22-10.0.0.1:33912.service: Deactivated successfully. Jul 10 00:46:25.111588 systemd[1]: session-5.scope: Deactivated successfully. Jul 10 00:46:25.112129 systemd-logind[1204]: Session 5 logged out. Waiting for processes to exit. Jul 10 00:46:25.113312 systemd[1]: Started sshd@5-10.0.0.135:22-10.0.0.1:33922.service. Jul 10 00:46:25.114000 systemd-logind[1204]: Removed session 5. Jul 10 00:46:25.154537 sshd[1314]: Accepted publickey for core from 10.0.0.1 port 33922 ssh2: RSA SHA256:qOVwIcEhxIMbnnVzVACNg4ZPFMKwsyA0M9qFZXlj7es Jul 10 00:46:25.156042 sshd[1314]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 10 00:46:25.159360 systemd-logind[1204]: New session 6 of user core. Jul 10 00:46:25.160177 systemd[1]: Started session-6.scope. Jul 10 00:46:25.210824 sudo[1318]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Jul 10 00:46:25.211048 sudo[1318]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Jul 10 00:46:25.213655 sudo[1318]: pam_unix(sudo:session): session closed for user root Jul 10 00:46:25.217891 sudo[1317]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Jul 10 00:46:25.218118 sudo[1317]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Jul 10 00:46:25.226501 systemd[1]: Stopping audit-rules.service... Jul 10 00:46:25.227000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Jul 10 00:46:25.227835 auditctl[1321]: No rules Jul 10 00:46:25.228085 systemd[1]: audit-rules.service: Deactivated successfully. Jul 10 00:46:25.228231 systemd[1]: Stopped audit-rules.service. Jul 10 00:46:25.229634 systemd[1]: Starting audit-rules.service... Jul 10 00:46:25.229961 kernel: kauditd_printk_skb: 132 callbacks suppressed Jul 10 00:46:25.229989 kernel: audit: type=1305 audit(1752108385.227:206): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Jul 10 00:46:25.230005 kernel: audit: type=1300 audit(1752108385.227:206): arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=ffffd48ab080 a2=420 a3=0 items=0 ppid=1 pid=1321 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:46:25.227000 audit[1321]: SYSCALL arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=ffffd48ab080 a2=420 a3=0 items=0 ppid=1 pid=1321 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:46:25.227000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Jul 10 00:46:25.234685 kernel: audit: type=1327 audit(1752108385.227:206): proctitle=2F7362696E2F617564697463746C002D44 Jul 10 00:46:25.234732 kernel: audit: type=1131 audit(1752108385.227:207): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:46:25.227000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:46:25.245320 augenrules[1338]: No rules Jul 10 00:46:25.245903 systemd[1]: Finished audit-rules.service. Jul 10 00:46:25.244000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:46:25.246618 sudo[1317]: pam_unix(sudo:session): session closed for user root Jul 10 00:46:25.245000 audit[1317]: USER_END pid=1317 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 10 00:46:25.252502 kernel: audit: type=1130 audit(1752108385.244:208): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:46:25.252576 kernel: audit: type=1106 audit(1752108385.245:209): pid=1317 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 10 00:46:25.252875 sshd[1314]: pam_unix(sshd:session): session closed for user core Jul 10 00:46:25.252880 systemd[1]: Started sshd@6-10.0.0.135:22-10.0.0.1:33932.service. Jul 10 00:46:25.245000 audit[1317]: CRED_DISP pid=1317 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 10 00:46:25.256505 kernel: audit: type=1104 audit(1752108385.245:210): pid=1317 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 10 00:46:25.252000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.135:22-10.0.0.1:33932 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:46:25.256812 systemd[1]: sshd@5-10.0.0.135:22-10.0.0.1:33922.service: Deactivated successfully. Jul 10 00:46:25.257387 systemd[1]: session-6.scope: Deactivated successfully. Jul 10 00:46:25.258442 systemd-logind[1204]: Session 6 logged out. Waiting for processes to exit. Jul 10 00:46:25.259302 kernel: audit: type=1130 audit(1752108385.252:211): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.135:22-10.0.0.1:33932 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:46:25.259345 kernel: audit: type=1106 audit(1752108385.253:212): pid=1314 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 10 00:46:25.253000 audit[1314]: USER_END pid=1314 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 10 00:46:25.259565 systemd-logind[1204]: Removed session 6. Jul 10 00:46:25.253000 audit[1314]: CRED_DISP pid=1314 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 10 00:46:25.265410 kernel: audit: type=1104 audit(1752108385.253:213): pid=1314 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 10 00:46:25.256000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.0.0.135:22-10.0.0.1:33922 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:46:25.295000 audit[1343]: USER_ACCT pid=1343 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 10 00:46:25.296205 sshd[1343]: Accepted publickey for core from 10.0.0.1 port 33932 ssh2: RSA SHA256:qOVwIcEhxIMbnnVzVACNg4ZPFMKwsyA0M9qFZXlj7es Jul 10 00:46:25.297000 audit[1343]: CRED_ACQ pid=1343 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 10 00:46:25.297000 audit[1343]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffcad2eb30 a2=3 a3=1 items=0 ppid=1 pid=1343 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=7 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:46:25.297000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 10 00:46:25.298244 sshd[1343]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 10 00:46:25.302358 systemd[1]: Started session-7.scope. Jul 10 00:46:25.302691 systemd-logind[1204]: New session 7 of user core. Jul 10 00:46:25.305000 audit[1343]: USER_START pid=1343 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 10 00:46:25.307000 audit[1346]: CRED_ACQ pid=1346 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 10 00:46:25.353000 audit[1347]: USER_ACCT pid=1347 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 10 00:46:25.354468 sudo[1347]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Jul 10 00:46:25.354000 audit[1347]: CRED_REFR pid=1347 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 10 00:46:25.354942 sudo[1347]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Jul 10 00:46:25.355000 audit[1347]: USER_START pid=1347 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 10 00:46:25.366316 systemd[1]: Starting coreos-metadata.service... Jul 10 00:46:25.371000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=coreos-metadata comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:46:25.371000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=coreos-metadata comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:46:25.372402 systemd[1]: coreos-metadata.service: Deactivated successfully. Jul 10 00:46:25.372600 systemd[1]: Finished coreos-metadata.service. Jul 10 00:46:25.855565 systemd[1]: Stopped kubelet.service. Jul 10 00:46:25.855000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:46:25.855000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:46:25.857609 systemd[1]: Starting kubelet.service... Jul 10 00:46:25.884766 systemd[1]: Reloading. Jul 10 00:46:25.952623 /usr/lib/systemd/system-generators/torcx-generator[1407]: time="2025-07-10T00:46:25Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" Jul 10 00:46:25.952653 /usr/lib/systemd/system-generators/torcx-generator[1407]: time="2025-07-10T00:46:25Z" level=info msg="torcx already run" Jul 10 00:46:26.114195 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Jul 10 00:46:26.114215 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Jul 10 00:46:26.129720 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Jul 10 00:46:26.178000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:26.178000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:26.178000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:26.178000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:26.178000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:26.178000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:26.178000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:26.178000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:26.178000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:26.178000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:26.178000 audit: BPF prog-id=43 op=LOAD Jul 10 00:46:26.178000 audit: BPF prog-id=27 op=UNLOAD Jul 10 00:46:26.178000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:26.178000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:26.178000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:26.178000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:26.178000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:26.178000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:26.178000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:26.178000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:26.178000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:26.178000 audit: BPF prog-id=44 op=LOAD Jul 10 00:46:26.178000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:26.178000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:26.178000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:26.178000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:26.178000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:26.178000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:26.178000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:26.178000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:26.178000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:26.178000 audit: BPF prog-id=45 op=LOAD Jul 10 00:46:26.178000 audit: BPF prog-id=28 op=UNLOAD Jul 10 00:46:26.178000 audit: BPF prog-id=29 op=UNLOAD Jul 10 00:46:26.179000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:26.179000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:26.179000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:26.179000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:26.179000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:26.179000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:26.179000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:26.179000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:26.179000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:26.179000 audit: BPF prog-id=46 op=LOAD Jul 10 00:46:26.179000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:26.179000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:26.179000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:26.179000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:26.179000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:26.179000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:26.179000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:26.179000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:26.179000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:26.179000 audit: BPF prog-id=47 op=LOAD Jul 10 00:46:26.179000 audit: BPF prog-id=30 op=UNLOAD Jul 10 00:46:26.179000 audit: BPF prog-id=31 op=UNLOAD Jul 10 00:46:26.180000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:26.180000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:26.180000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:26.180000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:26.180000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:26.180000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:26.180000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:26.180000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:26.180000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:26.180000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:26.180000 audit: BPF prog-id=48 op=LOAD Jul 10 00:46:26.180000 audit: BPF prog-id=32 op=UNLOAD Jul 10 00:46:26.180000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:26.180000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:26.180000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:26.180000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:26.180000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:26.180000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:26.180000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:26.180000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:26.180000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:26.180000 audit: BPF prog-id=49 op=LOAD Jul 10 00:46:26.180000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:26.180000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:26.180000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:26.180000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:26.180000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:26.180000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:26.180000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:26.180000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:26.180000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:26.180000 audit: BPF prog-id=50 op=LOAD Jul 10 00:46:26.180000 audit: BPF prog-id=33 op=UNLOAD Jul 10 00:46:26.180000 audit: BPF prog-id=34 op=UNLOAD Jul 10 00:46:26.182000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:26.182000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:26.182000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:26.182000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:26.182000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:26.182000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:26.182000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:26.182000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:26.182000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:26.182000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:26.182000 audit: BPF prog-id=51 op=LOAD Jul 10 00:46:26.182000 audit: BPF prog-id=37 op=UNLOAD Jul 10 00:46:26.182000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:26.182000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:26.182000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:26.182000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:26.182000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:26.182000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:26.182000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:26.182000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:26.182000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:26.183000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:26.183000 audit: BPF prog-id=52 op=LOAD Jul 10 00:46:26.183000 audit: BPF prog-id=38 op=UNLOAD Jul 10 00:46:26.183000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:26.183000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:26.183000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:26.183000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:26.183000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:26.183000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:26.183000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:26.183000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:26.183000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:26.183000 audit: BPF prog-id=53 op=LOAD Jul 10 00:46:26.183000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:26.183000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:26.183000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:26.183000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:26.183000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:26.183000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:26.183000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:26.183000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:26.183000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:26.183000 audit: BPF prog-id=54 op=LOAD Jul 10 00:46:26.183000 audit: BPF prog-id=39 op=UNLOAD Jul 10 00:46:26.183000 audit: BPF prog-id=40 op=UNLOAD Jul 10 00:46:26.183000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:26.183000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:26.183000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:26.183000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:26.183000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:26.183000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:26.183000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:26.183000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:26.183000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:26.183000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:26.183000 audit: BPF prog-id=55 op=LOAD Jul 10 00:46:26.183000 audit: BPF prog-id=35 op=UNLOAD Jul 10 00:46:26.184000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:26.184000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:26.184000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:26.184000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:26.184000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:26.184000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:26.184000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:26.184000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:26.184000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:26.184000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:26.184000 audit: BPF prog-id=56 op=LOAD Jul 10 00:46:26.184000 audit: BPF prog-id=41 op=UNLOAD Jul 10 00:46:26.185000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:26.185000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:26.185000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:26.185000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:26.185000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:26.185000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:26.185000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:26.185000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:26.185000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:26.185000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:26.185000 audit: BPF prog-id=57 op=LOAD Jul 10 00:46:26.185000 audit: BPF prog-id=36 op=UNLOAD Jul 10 00:46:26.199000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:46:26.200583 systemd[1]: Started kubelet.service. Jul 10 00:46:26.203293 systemd[1]: Stopping kubelet.service... Jul 10 00:46:26.203603 systemd[1]: kubelet.service: Deactivated successfully. Jul 10 00:46:26.203761 systemd[1]: Stopped kubelet.service. Jul 10 00:46:26.202000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:46:26.205216 systemd[1]: Starting kubelet.service... Jul 10 00:46:26.301330 systemd[1]: Started kubelet.service. Jul 10 00:46:26.300000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:46:26.332044 kubelet[1452]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Jul 10 00:46:26.332044 kubelet[1452]: Flag --pod-infra-container-image has been deprecated, will be removed in 1.35. Image garbage collector will get sandbox image information from CRI. Jul 10 00:46:26.332044 kubelet[1452]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Jul 10 00:46:26.332365 kubelet[1452]: I0710 00:46:26.332118 1452 server.go:212] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Jul 10 00:46:26.942388 kubelet[1452]: I0710 00:46:26.942344 1452 server.go:530] "Kubelet version" kubeletVersion="v1.33.0" Jul 10 00:46:26.942388 kubelet[1452]: I0710 00:46:26.942377 1452 server.go:532] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Jul 10 00:46:26.942646 kubelet[1452]: I0710 00:46:26.942621 1452 server.go:956] "Client rotation is on, will bootstrap in background" Jul 10 00:46:27.038916 kubelet[1452]: I0710 00:46:27.038659 1452 dynamic_cafile_content.go:161] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Jul 10 00:46:27.054682 kubelet[1452]: E0710 00:46:27.054621 1452 log.go:32] "RuntimeConfig from runtime service failed" err="rpc error: code = Unimplemented desc = unknown method RuntimeConfig for service runtime.v1.RuntimeService" Jul 10 00:46:27.054682 kubelet[1452]: I0710 00:46:27.054677 1452 server.go:1423] "CRI implementation should be updated to support RuntimeConfig when KubeletCgroupDriverFromCRI feature gate has been enabled. Falling back to using cgroupDriver from kubelet config." Jul 10 00:46:27.057827 kubelet[1452]: I0710 00:46:27.057800 1452 server.go:782] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Jul 10 00:46:27.058294 kubelet[1452]: I0710 00:46:27.058263 1452 container_manager_linux.go:267] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Jul 10 00:46:27.058534 kubelet[1452]: I0710 00:46:27.058354 1452 container_manager_linux.go:272] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"10.0.0.135","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"MemoryManagerPolicy":"None","MemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null,"CgroupVersion":2} Jul 10 00:46:27.058823 kubelet[1452]: I0710 00:46:27.058807 1452 topology_manager.go:138] "Creating topology manager with none policy" Jul 10 00:46:27.058894 kubelet[1452]: I0710 00:46:27.058884 1452 container_manager_linux.go:303] "Creating device plugin manager" Jul 10 00:46:27.059256 kubelet[1452]: I0710 00:46:27.059242 1452 state_mem.go:36] "Initialized new in-memory state store" Jul 10 00:46:27.067490 kubelet[1452]: I0710 00:46:27.067455 1452 kubelet.go:480] "Attempting to sync node with API server" Jul 10 00:46:27.067632 kubelet[1452]: I0710 00:46:27.067619 1452 kubelet.go:375] "Adding static pod path" path="/etc/kubernetes/manifests" Jul 10 00:46:27.069064 kubelet[1452]: I0710 00:46:27.069042 1452 kubelet.go:386] "Adding apiserver pod source" Jul 10 00:46:27.070601 kubelet[1452]: I0710 00:46:27.070577 1452 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Jul 10 00:46:27.071147 kubelet[1452]: E0710 00:46:27.070608 1452 file.go:98] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 00:46:27.071147 kubelet[1452]: E0710 00:46:27.070664 1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 00:46:27.072440 kubelet[1452]: I0710 00:46:27.072417 1452 kuberuntime_manager.go:279] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Jul 10 00:46:27.073653 kubelet[1452]: I0710 00:46:27.073621 1452 kubelet.go:935] "Not starting ClusterTrustBundle informer because we are in static kubelet mode or the ClusterTrustBundleProjection featuregate is disabled" Jul 10 00:46:27.073883 kubelet[1452]: W0710 00:46:27.073858 1452 probe.go:272] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Jul 10 00:46:27.077840 kubelet[1452]: I0710 00:46:27.077768 1452 watchdog_linux.go:99] "Systemd watchdog is not enabled" Jul 10 00:46:27.077899 kubelet[1452]: I0710 00:46:27.077870 1452 server.go:1289] "Started kubelet" Jul 10 00:46:27.078075 kubelet[1452]: I0710 00:46:27.078038 1452 server.go:180] "Starting to listen" address="0.0.0.0" port=10250 Jul 10 00:46:27.079077 kubelet[1452]: I0710 00:46:27.079055 1452 server.go:317] "Adding debug handlers to kubelet server" Jul 10 00:46:27.080000 audit[1452]: AVC avc: denied { mac_admin } for pid=1452 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:27.080000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Jul 10 00:46:27.080000 audit[1452]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000af9620 a1=4000775dd0 a2=4000af95f0 a3=25 items=0 ppid=1 pid=1452 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:46:27.080000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Jul 10 00:46:27.080000 audit[1452]: AVC avc: denied { mac_admin } for pid=1452 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:27.080000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Jul 10 00:46:27.080000 audit[1452]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000501420 a1=4000775de8 a2=4000af96b0 a3=25 items=0 ppid=1 pid=1452 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:46:27.080000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Jul 10 00:46:27.082547 kubelet[1452]: I0710 00:46:27.082092 1452 kubelet.go:1552] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/plugins_registry: invalid argument" Jul 10 00:46:27.082547 kubelet[1452]: I0710 00:46:27.082129 1452 kubelet.go:1556] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/plugins: invalid argument" Jul 10 00:46:27.082547 kubelet[1452]: I0710 00:46:27.082192 1452 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Jul 10 00:46:27.085360 kubelet[1452]: I0710 00:46:27.085264 1452 dynamic_serving_content.go:135] "Starting controller" name="kubelet-server-cert-files::/var/lib/kubelet/pki/kubelet.crt::/var/lib/kubelet/pki/kubelet.key" Jul 10 00:46:27.086083 kubelet[1452]: I0710 00:46:27.086027 1452 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 Jul 10 00:46:27.086865 kubelet[1452]: E0710 00:46:27.086707 1452 kubelet.go:1600] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Jul 10 00:46:27.086865 kubelet[1452]: E0710 00:46:27.086772 1452 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"10.0.0.135\" not found" Jul 10 00:46:27.086865 kubelet[1452]: I0710 00:46:27.086794 1452 volume_manager.go:297] "Starting Kubelet Volume Manager" Jul 10 00:46:27.087020 kubelet[1452]: I0710 00:46:27.086992 1452 desired_state_of_world_populator.go:150] "Desired state populator starts to run" Jul 10 00:46:27.087067 kubelet[1452]: I0710 00:46:27.087053 1452 reconciler.go:26] "Reconciler: start to sync state" Jul 10 00:46:27.087217 kubelet[1452]: I0710 00:46:27.087201 1452 server.go:255] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Jul 10 00:46:27.089811 kubelet[1452]: I0710 00:46:27.089776 1452 factory.go:223] Registration of the containerd container factory successfully Jul 10 00:46:27.089811 kubelet[1452]: I0710 00:46:27.089803 1452 factory.go:223] Registration of the systemd container factory successfully Jul 10 00:46:27.089920 kubelet[1452]: I0710 00:46:27.089889 1452 factory.go:221] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory Jul 10 00:46:27.099691 kubelet[1452]: E0710 00:46:27.097029 1452 event.go:359] "Server rejected event (will not retry!)" err="events is forbidden: User \"system:anonymous\" cannot create resource \"events\" in API group \"\" in the namespace \"default\"" event="&Event{ObjectMeta:{10.0.0.135.1850bd4b83c1cd24 default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:10.0.0.135,UID:10.0.0.135,APIVersion:,ResourceVersion:,FieldPath:,},Reason:Starting,Message:Starting kubelet.,Source:EventSource{Component:kubelet,Host:10.0.0.135,},FirstTimestamp:2025-07-10 00:46:27.077836068 +0000 UTC m=+0.772941183,LastTimestamp:2025-07-10 00:46:27.077836068 +0000 UTC m=+0.772941183,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:10.0.0.135,}" Jul 10 00:46:27.099691 kubelet[1452]: E0710 00:46:27.098953 1452 controller.go:145] "Failed to ensure lease exists, will retry" err="leases.coordination.k8s.io \"10.0.0.135\" is forbidden: User \"system:anonymous\" cannot get resource \"leases\" in API group \"coordination.k8s.io\" in the namespace \"kube-node-lease\"" interval="200ms" Jul 10 00:46:27.099691 kubelet[1452]: E0710 00:46:27.099034 1452 reflector.go:200] "Failed to watch" err="failed to list *v1.Node: nodes \"10.0.0.135\" is forbidden: User \"system:anonymous\" cannot list resource \"nodes\" in API group \"\" at the cluster scope" logger="UnhandledError" reflector="k8s.io/client-go/informers/factory.go:160" type="*v1.Node" Jul 10 00:46:27.099691 kubelet[1452]: E0710 00:46:27.099108 1452 reflector.go:200] "Failed to watch" err="failed to list *v1.Service: services is forbidden: User \"system:anonymous\" cannot list resource \"services\" in API group \"\" at the cluster scope" logger="UnhandledError" reflector="k8s.io/client-go/informers/factory.go:160" type="*v1.Service" Jul 10 00:46:27.099901 kubelet[1452]: E0710 00:46:27.099223 1452 reflector.go:200] "Failed to watch" err="failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User \"system:anonymous\" cannot list resource \"csidrivers\" in API group \"storage.k8s.io\" at the cluster scope" logger="UnhandledError" reflector="k8s.io/client-go/informers/factory.go:160" type="*v1.CSIDriver" Jul 10 00:46:27.105212 kubelet[1452]: I0710 00:46:27.105179 1452 cpu_manager.go:221] "Starting CPU manager" policy="none" Jul 10 00:46:27.105212 kubelet[1452]: I0710 00:46:27.105203 1452 cpu_manager.go:222] "Reconciling" reconcilePeriod="10s" Jul 10 00:46:27.105345 kubelet[1452]: I0710 00:46:27.105221 1452 state_mem.go:36] "Initialized new in-memory state store" Jul 10 00:46:27.105939 kubelet[1452]: E0710 00:46:27.105851 1452 event.go:359] "Server rejected event (will not retry!)" err="events is forbidden: User \"system:anonymous\" cannot create resource \"events\" in API group \"\" in the namespace \"default\"" event="&Event{ObjectMeta:{10.0.0.135.1850bd4b8448f0c4 default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:10.0.0.135,UID:10.0.0.135,APIVersion:,ResourceVersion:,FieldPath:,},Reason:InvalidDiskCapacity,Message:invalid capacity 0 on image filesystem,Source:EventSource{Component:kubelet,Host:10.0.0.135,},FirstTimestamp:2025-07-10 00:46:27.086692548 +0000 UTC m=+0.781797585,LastTimestamp:2025-07-10 00:46:27.086692548 +0000 UTC m=+0.781797585,Count:1,Type:Warning,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:10.0.0.135,}" Jul 10 00:46:27.179815 kubelet[1452]: I0710 00:46:27.179478 1452 policy_none.go:49] "None policy: Start" Jul 10 00:46:27.179815 kubelet[1452]: I0710 00:46:27.179536 1452 memory_manager.go:186] "Starting memorymanager" policy="None" Jul 10 00:46:27.179815 kubelet[1452]: I0710 00:46:27.179549 1452 state_mem.go:35] "Initializing new in-memory state store" Jul 10 00:46:27.184562 systemd[1]: Created slice kubepods.slice. Jul 10 00:46:27.187132 kubelet[1452]: E0710 00:46:27.187098 1452 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"10.0.0.135\" not found" Jul 10 00:46:27.192825 systemd[1]: Created slice kubepods-burstable.slice. Jul 10 00:46:27.197166 systemd[1]: Created slice kubepods-besteffort.slice. Jul 10 00:46:27.197000 audit[1476]: NETFILTER_CFG table=mangle:2 family=2 entries=2 op=nft_register_chain pid=1476 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 10 00:46:27.197000 audit[1476]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=ffffdf06df40 a2=0 a3=1 items=0 ppid=1452 pid=1476 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:46:27.197000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Jul 10 00:46:27.198000 audit[1477]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=1477 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 10 00:46:27.198000 audit[1477]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=132 a0=3 a1=ffffdc6ec440 a2=0 a3=1 items=0 ppid=1452 pid=1477 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:46:27.198000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Jul 10 00:46:27.211322 kubelet[1452]: E0710 00:46:27.211293 1452 manager.go:517] "Failed to read data from checkpoint" err="checkpoint is not found" checkpoint="kubelet_internal_checkpoint" Jul 10 00:46:27.210000 audit[1452]: AVC avc: denied { mac_admin } for pid=1452 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:27.210000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Jul 10 00:46:27.210000 audit[1452]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=40006f2f30 a1=4000d50018 a2=40006f2f00 a3=25 items=0 ppid=1 pid=1452 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:46:27.210000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Jul 10 00:46:27.212075 kubelet[1452]: E0710 00:46:27.212053 1452 server.go:94] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/device-plugins/: invalid argument" path="/var/lib/kubelet/device-plugins/" Jul 10 00:46:27.212372 kubelet[1452]: I0710 00:46:27.212356 1452 eviction_manager.go:189] "Eviction manager: starting control loop" Jul 10 00:46:27.212631 kubelet[1452]: I0710 00:46:27.212452 1452 container_log_manager.go:189] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" Jul 10 00:46:27.213030 kubelet[1452]: I0710 00:46:27.213014 1452 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Jul 10 00:46:27.213641 kubelet[1452]: E0710 00:46:27.213621 1452 eviction_manager.go:267] "eviction manager: failed to check if we have separate container filesystem. Ignoring." err="no imagefs label for configured runtime" Jul 10 00:46:27.213754 kubelet[1452]: E0710 00:46:27.213741 1452 eviction_manager.go:292] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"10.0.0.135\" not found" Jul 10 00:46:27.199000 audit[1479]: NETFILTER_CFG table=filter:4 family=2 entries=2 op=nft_register_chain pid=1479 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 10 00:46:27.199000 audit[1479]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=312 a0=3 a1=ffffd3f82a40 a2=0 a3=1 items=0 ppid=1452 pid=1479 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:46:27.199000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Jul 10 00:46:27.226000 audit[1484]: NETFILTER_CFG table=filter:5 family=2 entries=2 op=nft_register_chain pid=1484 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 10 00:46:27.226000 audit[1484]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=312 a0=3 a1=ffffe5efa970 a2=0 a3=1 items=0 ppid=1452 pid=1484 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:46:27.226000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Jul 10 00:46:27.254000 audit[1489]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=1489 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 10 00:46:27.254000 audit[1489]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=924 a0=3 a1=ffffdcc26640 a2=0 a3=1 items=0 ppid=1452 pid=1489 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:46:27.254000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Jul 10 00:46:27.256421 kubelet[1452]: I0710 00:46:27.256281 1452 kubelet_network_linux.go:49] "Initialized iptables rules." protocol="IPv4" Jul 10 00:46:27.255000 audit[1491]: NETFILTER_CFG table=mangle:7 family=2 entries=1 op=nft_register_chain pid=1491 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 10 00:46:27.255000 audit[1491]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=fffffa1ba0c0 a2=0 a3=1 items=0 ppid=1452 pid=1491 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:46:27.255000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Jul 10 00:46:27.255000 audit[1490]: NETFILTER_CFG table=mangle:8 family=10 entries=2 op=nft_register_chain pid=1490 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 10 00:46:27.255000 audit[1490]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=ffffc6921d60 a2=0 a3=1 items=0 ppid=1452 pid=1490 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:46:27.255000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Jul 10 00:46:27.257458 kubelet[1452]: I0710 00:46:27.257440 1452 kubelet_network_linux.go:49] "Initialized iptables rules." protocol="IPv6" Jul 10 00:46:27.257510 kubelet[1452]: I0710 00:46:27.257463 1452 status_manager.go:230] "Starting to sync pod status with apiserver" Jul 10 00:46:27.257510 kubelet[1452]: I0710 00:46:27.257498 1452 watchdog_linux.go:127] "Systemd watchdog is not enabled or the interval is invalid, so health checking will not be started." Jul 10 00:46:27.257556 kubelet[1452]: I0710 00:46:27.257516 1452 kubelet.go:2436] "Starting kubelet main sync loop" Jul 10 00:46:27.257663 kubelet[1452]: E0710 00:46:27.257638 1452 kubelet.go:2460] "Skipping pod synchronization" err="PLEG is not healthy: pleg has yet to be successful" Jul 10 00:46:27.256000 audit[1492]: NETFILTER_CFG table=nat:9 family=2 entries=2 op=nft_register_chain pid=1492 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 10 00:46:27.256000 audit[1492]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=128 a0=3 a1=ffffccddf0b0 a2=0 a3=1 items=0 ppid=1452 pid=1492 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:46:27.256000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Jul 10 00:46:27.257000 audit[1493]: NETFILTER_CFG table=mangle:10 family=10 entries=1 op=nft_register_chain pid=1493 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 10 00:46:27.257000 audit[1493]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffcdaad410 a2=0 a3=1 items=0 ppid=1452 pid=1493 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:46:27.257000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Jul 10 00:46:27.257000 audit[1494]: NETFILTER_CFG table=filter:11 family=2 entries=1 op=nft_register_chain pid=1494 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 10 00:46:27.257000 audit[1494]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffdfed1a80 a2=0 a3=1 items=0 ppid=1452 pid=1494 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:46:27.257000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Jul 10 00:46:27.258000 audit[1496]: NETFILTER_CFG table=nat:12 family=10 entries=2 op=nft_register_chain pid=1496 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 10 00:46:27.258000 audit[1496]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=128 a0=3 a1=ffffe18bb790 a2=0 a3=1 items=0 ppid=1452 pid=1496 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:46:27.258000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Jul 10 00:46:27.259000 audit[1497]: NETFILTER_CFG table=filter:13 family=10 entries=2 op=nft_register_chain pid=1497 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 10 00:46:27.259000 audit[1497]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=ffffe8fa2d40 a2=0 a3=1 items=0 ppid=1452 pid=1497 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:46:27.259000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Jul 10 00:46:27.302983 kubelet[1452]: E0710 00:46:27.302918 1452 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"10.0.0.135\" not found" node="10.0.0.135" Jul 10 00:46:27.314294 kubelet[1452]: I0710 00:46:27.314251 1452 kubelet_node_status.go:75] "Attempting to register node" node="10.0.0.135" Jul 10 00:46:27.321301 kubelet[1452]: I0710 00:46:27.321247 1452 kubelet_node_status.go:78] "Successfully registered node" node="10.0.0.135" Jul 10 00:46:27.321301 kubelet[1452]: E0710 00:46:27.321279 1452 kubelet_node_status.go:548] "Error updating node status, will retry" err="error getting node \"10.0.0.135\": node \"10.0.0.135\" not found" Jul 10 00:46:27.330377 kubelet[1452]: E0710 00:46:27.330265 1452 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"10.0.0.135\" not found" Jul 10 00:46:27.431041 kubelet[1452]: E0710 00:46:27.430988 1452 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"10.0.0.135\" not found" Jul 10 00:46:27.531551 kubelet[1452]: E0710 00:46:27.531397 1452 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"10.0.0.135\" not found" Jul 10 00:46:27.632121 kubelet[1452]: E0710 00:46:27.632071 1452 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"10.0.0.135\" not found" Jul 10 00:46:27.732519 kubelet[1452]: E0710 00:46:27.732477 1452 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"10.0.0.135\" not found" Jul 10 00:46:27.823000 audit[1347]: USER_END pid=1347 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 10 00:46:27.823757 sudo[1347]: pam_unix(sudo:session): session closed for user root Jul 10 00:46:27.823000 audit[1347]: CRED_DISP pid=1347 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 10 00:46:27.825108 sshd[1343]: pam_unix(sshd:session): session closed for user core Jul 10 00:46:27.825000 audit[1343]: USER_END pid=1343 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 10 00:46:27.825000 audit[1343]: CRED_DISP pid=1343 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 10 00:46:27.827204 systemd[1]: session-7.scope: Deactivated successfully. Jul 10 00:46:27.827816 systemd-logind[1204]: Session 7 logged out. Waiting for processes to exit. Jul 10 00:46:27.827899 systemd[1]: sshd@6-10.0.0.135:22-10.0.0.1:33932.service: Deactivated successfully. Jul 10 00:46:27.827000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.135:22-10.0.0.1:33932 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:46:27.828878 systemd-logind[1204]: Removed session 7. Jul 10 00:46:27.832897 kubelet[1452]: E0710 00:46:27.832861 1452 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"10.0.0.135\" not found" Jul 10 00:46:27.933414 kubelet[1452]: E0710 00:46:27.933356 1452 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"10.0.0.135\" not found" Jul 10 00:46:27.944619 kubelet[1452]: I0710 00:46:27.944589 1452 transport.go:147] "Certificate rotation detected, shutting down client connections to start using new credentials" Jul 10 00:46:27.944781 kubelet[1452]: I0710 00:46:27.944746 1452 reflector.go:556] "Warning: watch ended with error" reflector="k8s.io/client-go/informers/factory.go:160" type="*v1.RuntimeClass" err="very short watch: k8s.io/client-go/informers/factory.go:160: Unexpected watch close - watch lasted less than a second and no items received" Jul 10 00:46:28.034787 kubelet[1452]: I0710 00:46:28.034759 1452 kuberuntime_manager.go:1746] "Updating runtime config through cri with podcidr" CIDR="192.168.1.0/24" Jul 10 00:46:28.035313 env[1213]: time="2025-07-10T00:46:28.035245456Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Jul 10 00:46:28.035739 kubelet[1452]: I0710 00:46:28.035718 1452 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.1.0/24" Jul 10 00:46:28.072019 kubelet[1452]: I0710 00:46:28.071981 1452 apiserver.go:52] "Watching apiserver" Jul 10 00:46:28.072019 kubelet[1452]: E0710 00:46:28.071996 1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 00:46:28.084427 kubelet[1452]: E0710 00:46:28.084330 1452 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-dt2n5" podUID="fbc40611-2884-42cd-adda-c9271a71838c" Jul 10 00:46:28.086515 systemd[1]: Created slice kubepods-besteffort-poddab09eb6_4546_4c03_883c_f3746191b45e.slice. Jul 10 00:46:28.087277 kubelet[1452]: I0710 00:46:28.087252 1452 desired_state_of_world_populator.go:158] "Finished populating initial desired state of world" Jul 10 00:46:28.090637 kubelet[1452]: I0710 00:46:28.090608 1452 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/fbc40611-2884-42cd-adda-c9271a71838c-registration-dir\") pod \"csi-node-driver-dt2n5\" (UID: \"fbc40611-2884-42cd-adda-c9271a71838c\") " pod="calico-system/csi-node-driver-dt2n5" Jul 10 00:46:28.090792 kubelet[1452]: I0710 00:46:28.090758 1452 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/fbc40611-2884-42cd-adda-c9271a71838c-socket-dir\") pod \"csi-node-driver-dt2n5\" (UID: \"fbc40611-2884-42cd-adda-c9271a71838c\") " pod="calico-system/csi-node-driver-dt2n5" Jul 10 00:46:28.090852 kubelet[1452]: I0710 00:46:28.090815 1452 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/eeadf17d-df89-483f-a46e-98008f23f9cd-kube-proxy\") pod \"kube-proxy-8hqt4\" (UID: \"eeadf17d-df89-483f-a46e-98008f23f9cd\") " pod="kube-system/kube-proxy-8hqt4" Jul 10 00:46:28.090852 kubelet[1452]: I0710 00:46:28.090839 1452 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/dab09eb6-4546-4c03-883c-f3746191b45e-cni-net-dir\") pod \"calico-node-xxrn8\" (UID: \"dab09eb6-4546-4c03-883c-f3746191b45e\") " pod="calico-system/calico-node-xxrn8" Jul 10 00:46:28.090898 kubelet[1452]: I0710 00:46:28.090861 1452 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/dab09eb6-4546-4c03-883c-f3746191b45e-policysync\") pod \"calico-node-xxrn8\" (UID: \"dab09eb6-4546-4c03-883c-f3746191b45e\") " pod="calico-system/calico-node-xxrn8" Jul 10 00:46:28.090898 kubelet[1452]: I0710 00:46:28.090879 1452 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/fbc40611-2884-42cd-adda-c9271a71838c-kubelet-dir\") pod \"csi-node-driver-dt2n5\" (UID: \"fbc40611-2884-42cd-adda-c9271a71838c\") " pod="calico-system/csi-node-driver-dt2n5" Jul 10 00:46:28.090939 kubelet[1452]: I0710 00:46:28.090902 1452 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/fbc40611-2884-42cd-adda-c9271a71838c-varrun\") pod \"csi-node-driver-dt2n5\" (UID: \"fbc40611-2884-42cd-adda-c9271a71838c\") " pod="calico-system/csi-node-driver-dt2n5" Jul 10 00:46:28.090939 kubelet[1452]: I0710 00:46:28.090919 1452 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/eeadf17d-df89-483f-a46e-98008f23f9cd-xtables-lock\") pod \"kube-proxy-8hqt4\" (UID: \"eeadf17d-df89-483f-a46e-98008f23f9cd\") " pod="kube-system/kube-proxy-8hqt4" Jul 10 00:46:28.090982 kubelet[1452]: I0710 00:46:28.090933 1452 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/eeadf17d-df89-483f-a46e-98008f23f9cd-lib-modules\") pod \"kube-proxy-8hqt4\" (UID: \"eeadf17d-df89-483f-a46e-98008f23f9cd\") " pod="kube-system/kube-proxy-8hqt4" Jul 10 00:46:28.090982 kubelet[1452]: I0710 00:46:28.090972 1452 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/dab09eb6-4546-4c03-883c-f3746191b45e-cni-log-dir\") pod \"calico-node-xxrn8\" (UID: \"dab09eb6-4546-4c03-883c-f3746191b45e\") " pod="calico-system/calico-node-xxrn8" Jul 10 00:46:28.091024 kubelet[1452]: I0710 00:46:28.090987 1452 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/dab09eb6-4546-4c03-883c-f3746191b45e-lib-modules\") pod \"calico-node-xxrn8\" (UID: \"dab09eb6-4546-4c03-883c-f3746191b45e\") " pod="calico-system/calico-node-xxrn8" Jul 10 00:46:28.091077 kubelet[1452]: I0710 00:46:28.091048 1452 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/dab09eb6-4546-4c03-883c-f3746191b45e-var-run-calico\") pod \"calico-node-xxrn8\" (UID: \"dab09eb6-4546-4c03-883c-f3746191b45e\") " pod="calico-system/calico-node-xxrn8" Jul 10 00:46:28.091112 kubelet[1452]: I0710 00:46:28.091083 1452 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/dab09eb6-4546-4c03-883c-f3746191b45e-xtables-lock\") pod \"calico-node-xxrn8\" (UID: \"dab09eb6-4546-4c03-883c-f3746191b45e\") " pod="calico-system/calico-node-xxrn8" Jul 10 00:46:28.091112 kubelet[1452]: I0710 00:46:28.091100 1452 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/dab09eb6-4546-4c03-883c-f3746191b45e-cni-bin-dir\") pod \"calico-node-xxrn8\" (UID: \"dab09eb6-4546-4c03-883c-f3746191b45e\") " pod="calico-system/calico-node-xxrn8" Jul 10 00:46:28.091158 kubelet[1452]: I0710 00:46:28.091122 1452 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/dab09eb6-4546-4c03-883c-f3746191b45e-flexvol-driver-host\") pod \"calico-node-xxrn8\" (UID: \"dab09eb6-4546-4c03-883c-f3746191b45e\") " pod="calico-system/calico-node-xxrn8" Jul 10 00:46:28.091158 kubelet[1452]: I0710 00:46:28.091141 1452 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/dab09eb6-4546-4c03-883c-f3746191b45e-node-certs\") pod \"calico-node-xxrn8\" (UID: \"dab09eb6-4546-4c03-883c-f3746191b45e\") " pod="calico-system/calico-node-xxrn8" Jul 10 00:46:28.091158 kubelet[1452]: I0710 00:46:28.091156 1452 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/dab09eb6-4546-4c03-883c-f3746191b45e-var-lib-calico\") pod \"calico-node-xxrn8\" (UID: \"dab09eb6-4546-4c03-883c-f3746191b45e\") " pod="calico-system/calico-node-xxrn8" Jul 10 00:46:28.091218 kubelet[1452]: I0710 00:46:28.091171 1452 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-j5bnd\" (UniqueName: \"kubernetes.io/projected/dab09eb6-4546-4c03-883c-f3746191b45e-kube-api-access-j5bnd\") pod \"calico-node-xxrn8\" (UID: \"dab09eb6-4546-4c03-883c-f3746191b45e\") " pod="calico-system/calico-node-xxrn8" Jul 10 00:46:28.091218 kubelet[1452]: I0710 00:46:28.091195 1452 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-q7g9v\" (UniqueName: \"kubernetes.io/projected/fbc40611-2884-42cd-adda-c9271a71838c-kube-api-access-q7g9v\") pod \"csi-node-driver-dt2n5\" (UID: \"fbc40611-2884-42cd-adda-c9271a71838c\") " pod="calico-system/csi-node-driver-dt2n5" Jul 10 00:46:28.091265 kubelet[1452]: I0710 00:46:28.091223 1452 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-h8n7p\" (UniqueName: \"kubernetes.io/projected/eeadf17d-df89-483f-a46e-98008f23f9cd-kube-api-access-h8n7p\") pod \"kube-proxy-8hqt4\" (UID: \"eeadf17d-df89-483f-a46e-98008f23f9cd\") " pod="kube-system/kube-proxy-8hqt4" Jul 10 00:46:28.091265 kubelet[1452]: I0710 00:46:28.091245 1452 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/dab09eb6-4546-4c03-883c-f3746191b45e-tigera-ca-bundle\") pod \"calico-node-xxrn8\" (UID: \"dab09eb6-4546-4c03-883c-f3746191b45e\") " pod="calico-system/calico-node-xxrn8" Jul 10 00:46:28.109307 systemd[1]: Created slice kubepods-besteffort-podeeadf17d_df89_483f_a46e_98008f23f9cd.slice. Jul 10 00:46:28.192357 kubelet[1452]: I0710 00:46:28.192316 1452 swap_util.go:74] "error creating dir to test if tmpfs noswap is enabled. Assuming not supported" mount path="" error="stat /var/lib/kubelet/plugins/kubernetes.io/empty-dir: no such file or directory" Jul 10 00:46:28.193340 kubelet[1452]: E0710 00:46:28.193292 1452 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 10 00:46:28.193340 kubelet[1452]: W0710 00:46:28.193311 1452 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 10 00:46:28.193340 kubelet[1452]: E0710 00:46:28.193329 1452 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 10 00:46:28.193560 kubelet[1452]: E0710 00:46:28.193548 1452 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 10 00:46:28.193560 kubelet[1452]: W0710 00:46:28.193560 1452 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 10 00:46:28.193615 kubelet[1452]: E0710 00:46:28.193570 1452 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 10 00:46:28.195695 kubelet[1452]: E0710 00:46:28.195676 1452 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 10 00:46:28.195804 kubelet[1452]: W0710 00:46:28.195788 1452 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 10 00:46:28.195881 kubelet[1452]: E0710 00:46:28.195868 1452 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 10 00:46:28.207120 kubelet[1452]: E0710 00:46:28.207098 1452 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 10 00:46:28.207120 kubelet[1452]: W0710 00:46:28.207113 1452 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 10 00:46:28.207222 kubelet[1452]: E0710 00:46:28.207134 1452 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 10 00:46:28.208905 kubelet[1452]: E0710 00:46:28.208878 1452 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 10 00:46:28.208905 kubelet[1452]: W0710 00:46:28.208892 1452 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 10 00:46:28.208905 kubelet[1452]: E0710 00:46:28.208904 1452 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 10 00:46:28.210100 kubelet[1452]: E0710 00:46:28.210082 1452 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 10 00:46:28.210189 kubelet[1452]: W0710 00:46:28.210175 1452 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 10 00:46:28.210264 kubelet[1452]: E0710 00:46:28.210251 1452 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 10 00:46:28.409582 env[1213]: time="2025-07-10T00:46:28.409445656Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-xxrn8,Uid:dab09eb6-4546-4c03-883c-f3746191b45e,Namespace:calico-system,Attempt:0,}" Jul 10 00:46:28.411815 kubelet[1452]: E0710 00:46:28.411782 1452 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Jul 10 00:46:28.412578 env[1213]: time="2025-07-10T00:46:28.412533510Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-8hqt4,Uid:eeadf17d-df89-483f-a46e-98008f23f9cd,Namespace:kube-system,Attempt:0,}" Jul 10 00:46:29.044812 env[1213]: time="2025-07-10T00:46:29.044764889Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 10 00:46:29.046057 env[1213]: time="2025-07-10T00:46:29.046016838Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 10 00:46:29.047582 env[1213]: time="2025-07-10T00:46:29.047554713Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7d46a07936af93fcce097459055f93ab07331509aa55f4a2a90d95a3ace1850e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 10 00:46:29.050900 env[1213]: time="2025-07-10T00:46:29.050859016Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:7d46a07936af93fcce097459055f93ab07331509aa55f4a2a90d95a3ace1850e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 10 00:46:29.053597 env[1213]: time="2025-07-10T00:46:29.053556030Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 10 00:46:29.054364 env[1213]: time="2025-07-10T00:46:29.054333629Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 10 00:46:29.056895 env[1213]: time="2025-07-10T00:46:29.056858794Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 10 00:46:29.058373 env[1213]: time="2025-07-10T00:46:29.058341307Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 10 00:46:29.072549 kubelet[1452]: E0710 00:46:29.072506 1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 00:46:29.082401 env[1213]: time="2025-07-10T00:46:29.082333198Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 10 00:46:29.082579 env[1213]: time="2025-07-10T00:46:29.082374631Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 10 00:46:29.082579 env[1213]: time="2025-07-10T00:46:29.082385285Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 10 00:46:29.082751 env[1213]: time="2025-07-10T00:46:29.082629937Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/ab31316125bba65acb94a2b36ebd79a7a8a41f9258a7c3fe6e7143b2b7196482 pid=1529 runtime=io.containerd.runc.v2 Jul 10 00:46:29.082827 env[1213]: time="2025-07-10T00:46:29.082450671Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 10 00:46:29.082827 env[1213]: time="2025-07-10T00:46:29.082488986Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 10 00:46:29.082827 env[1213]: time="2025-07-10T00:46:29.082510413Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 10 00:46:29.082827 env[1213]: time="2025-07-10T00:46:29.082778899Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/665983cb0bc21b4485e91a825717a8dd4bc5f0b68924093ab7fd0c5de7e65436 pid=1528 runtime=io.containerd.runc.v2 Jul 10 00:46:29.111260 systemd[1]: Started cri-containerd-665983cb0bc21b4485e91a825717a8dd4bc5f0b68924093ab7fd0c5de7e65436.scope. Jul 10 00:46:29.113640 systemd[1]: Started cri-containerd-ab31316125bba65acb94a2b36ebd79a7a8a41f9258a7c3fe6e7143b2b7196482.scope. Jul 10 00:46:29.148000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:29.148000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:29.148000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:29.148000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:29.148000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:29.148000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:29.148000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:29.148000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:29.148000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:29.148000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:29.148000 audit: BPF prog-id=58 op=LOAD Jul 10 00:46:29.148000 audit[1551]: AVC avc: denied { bpf } for pid=1551 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:29.148000 audit[1551]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=400014db38 a2=10 a3=0 items=0 ppid=1528 pid=1551 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:46:29.148000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3636353938336362306263323162343438356539316138323537313761 Jul 10 00:46:29.148000 audit[1551]: AVC avc: denied { perfmon } for pid=1551 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:29.148000 audit[1551]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=400014d5a0 a2=3c a3=0 items=0 ppid=1528 pid=1551 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:46:29.148000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3636353938336362306263323162343438356539316138323537313761 Jul 10 00:46:29.148000 audit[1551]: AVC avc: denied { bpf } for pid=1551 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:29.148000 audit[1551]: AVC avc: denied { bpf } for pid=1551 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:29.148000 audit[1551]: AVC avc: denied { bpf } for pid=1551 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:29.148000 audit[1551]: AVC avc: denied { perfmon } for pid=1551 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:29.148000 audit[1551]: AVC avc: denied { perfmon } for pid=1551 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:29.148000 audit[1551]: AVC avc: denied { perfmon } for pid=1551 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:29.148000 audit[1551]: AVC avc: denied { perfmon } for pid=1551 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:29.148000 audit[1551]: AVC avc: denied { perfmon } for pid=1551 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:29.148000 audit[1551]: AVC avc: denied { bpf } for pid=1551 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:29.148000 audit[1551]: AVC avc: denied { bpf } for pid=1551 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:29.148000 audit: BPF prog-id=59 op=LOAD Jul 10 00:46:29.148000 audit[1551]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400014d8e0 a2=78 a3=0 items=0 ppid=1528 pid=1551 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:46:29.148000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3636353938336362306263323162343438356539316138323537313761 Jul 10 00:46:29.149000 audit[1551]: AVC avc: denied { bpf } for pid=1551 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:29.149000 audit[1551]: AVC avc: denied { bpf } for pid=1551 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:29.149000 audit[1551]: AVC avc: denied { perfmon } for pid=1551 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:29.149000 audit[1551]: AVC avc: denied { perfmon } for pid=1551 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:29.149000 audit[1551]: AVC avc: denied { perfmon } for pid=1551 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:29.149000 audit[1551]: AVC avc: denied { perfmon } for pid=1551 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:29.149000 audit[1551]: AVC avc: denied { perfmon } for pid=1551 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:29.149000 audit[1551]: AVC avc: denied { bpf } for pid=1551 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:29.149000 audit[1551]: AVC avc: denied { bpf } for pid=1551 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:29.149000 audit: BPF prog-id=60 op=LOAD Jul 10 00:46:29.149000 audit[1551]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=400014d670 a2=78 a3=0 items=0 ppid=1528 pid=1551 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:46:29.149000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3636353938336362306263323162343438356539316138323537313761 Jul 10 00:46:29.149000 audit: BPF prog-id=60 op=UNLOAD Jul 10 00:46:29.149000 audit: BPF prog-id=59 op=UNLOAD Jul 10 00:46:29.149000 audit[1551]: AVC avc: denied { bpf } for pid=1551 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:29.149000 audit[1551]: AVC avc: denied { bpf } for pid=1551 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:29.149000 audit[1551]: AVC avc: denied { bpf } for pid=1551 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:29.149000 audit[1551]: AVC avc: denied { perfmon } for pid=1551 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:29.149000 audit[1551]: AVC avc: denied { perfmon } for pid=1551 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:29.149000 audit[1551]: AVC avc: denied { perfmon } for pid=1551 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:29.149000 audit[1551]: AVC avc: denied { perfmon } for pid=1551 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:29.149000 audit[1551]: AVC avc: denied { perfmon } for pid=1551 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:29.149000 audit[1551]: AVC avc: denied { bpf } for pid=1551 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:29.149000 audit[1551]: AVC avc: denied { bpf } for pid=1551 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:29.149000 audit: BPF prog-id=61 op=LOAD Jul 10 00:46:29.149000 audit[1551]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400014db40 a2=78 a3=0 items=0 ppid=1528 pid=1551 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:46:29.149000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3636353938336362306263323162343438356539316138323537313761 Jul 10 00:46:29.152000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:29.152000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:29.152000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:29.152000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:29.152000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:29.152000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:29.152000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:29.152000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:29.152000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:29.153000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:29.153000 audit: BPF prog-id=62 op=LOAD Jul 10 00:46:29.154000 audit[1548]: AVC avc: denied { bpf } for pid=1548 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:29.154000 audit[1548]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=1529 pid=1548 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:46:29.154000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6162333133313631323562626136356163623934613262333665626437 Jul 10 00:46:29.154000 audit[1548]: AVC avc: denied { perfmon } for pid=1548 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:29.154000 audit[1548]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=1529 pid=1548 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:46:29.154000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6162333133313631323562626136356163623934613262333665626437 Jul 10 00:46:29.154000 audit[1548]: AVC avc: denied { bpf } for pid=1548 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:29.154000 audit[1548]: AVC avc: denied { bpf } for pid=1548 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:29.154000 audit[1548]: AVC avc: denied { bpf } for pid=1548 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:29.154000 audit[1548]: AVC avc: denied { perfmon } for pid=1548 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:29.154000 audit[1548]: AVC avc: denied { perfmon } for pid=1548 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:29.154000 audit[1548]: AVC avc: denied { perfmon } for pid=1548 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:29.154000 audit[1548]: AVC avc: denied { perfmon } for pid=1548 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:29.154000 audit[1548]: AVC avc: denied { perfmon } for pid=1548 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:29.154000 audit[1548]: AVC avc: denied { bpf } for pid=1548 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:29.154000 audit[1548]: AVC avc: denied { bpf } for pid=1548 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:29.154000 audit: BPF prog-id=63 op=LOAD Jul 10 00:46:29.154000 audit[1548]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=1529 pid=1548 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:46:29.154000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6162333133313631323562626136356163623934613262333665626437 Jul 10 00:46:29.157000 audit[1548]: AVC avc: denied { bpf } for pid=1548 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:29.157000 audit[1548]: AVC avc: denied { bpf } for pid=1548 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:29.157000 audit[1548]: AVC avc: denied { perfmon } for pid=1548 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:29.157000 audit[1548]: AVC avc: denied { perfmon } for pid=1548 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:29.157000 audit[1548]: AVC avc: denied { perfmon } for pid=1548 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:29.157000 audit[1548]: AVC avc: denied { perfmon } for pid=1548 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:29.157000 audit[1548]: AVC avc: denied { perfmon } for pid=1548 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:29.157000 audit[1548]: AVC avc: denied { bpf } for pid=1548 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:29.157000 audit[1548]: AVC avc: denied { bpf } for pid=1548 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:29.157000 audit: BPF prog-id=64 op=LOAD Jul 10 00:46:29.157000 audit[1548]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=1529 pid=1548 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:46:29.157000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6162333133313631323562626136356163623934613262333665626437 Jul 10 00:46:29.157000 audit: BPF prog-id=64 op=UNLOAD Jul 10 00:46:29.157000 audit: BPF prog-id=63 op=UNLOAD Jul 10 00:46:29.157000 audit[1548]: AVC avc: denied { bpf } for pid=1548 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:29.157000 audit[1548]: AVC avc: denied { bpf } for pid=1548 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:29.157000 audit[1548]: AVC avc: denied { bpf } for pid=1548 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:29.157000 audit[1548]: AVC avc: denied { perfmon } for pid=1548 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:29.157000 audit[1548]: AVC avc: denied { perfmon } for pid=1548 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:29.157000 audit[1548]: AVC avc: denied { perfmon } for pid=1548 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:29.157000 audit[1548]: AVC avc: denied { perfmon } for pid=1548 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:29.157000 audit[1548]: AVC avc: denied { perfmon } for pid=1548 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:29.157000 audit[1548]: AVC avc: denied { bpf } for pid=1548 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:29.157000 audit[1548]: AVC avc: denied { bpf } for pid=1548 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:29.157000 audit: BPF prog-id=65 op=LOAD Jul 10 00:46:29.157000 audit[1548]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=1529 pid=1548 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:46:29.157000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6162333133313631323562626136356163623934613262333665626437 Jul 10 00:46:29.169022 env[1213]: time="2025-07-10T00:46:29.168944316Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-8hqt4,Uid:eeadf17d-df89-483f-a46e-98008f23f9cd,Namespace:kube-system,Attempt:0,} returns sandbox id \"665983cb0bc21b4485e91a825717a8dd4bc5f0b68924093ab7fd0c5de7e65436\"" Jul 10 00:46:29.170477 env[1213]: time="2025-07-10T00:46:29.170011552Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-xxrn8,Uid:dab09eb6-4546-4c03-883c-f3746191b45e,Namespace:calico-system,Attempt:0,} returns sandbox id \"ab31316125bba65acb94a2b36ebd79a7a8a41f9258a7c3fe6e7143b2b7196482\"" Jul 10 00:46:29.170562 kubelet[1452]: E0710 00:46:29.170228 1452 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Jul 10 00:46:29.171673 env[1213]: time="2025-07-10T00:46:29.171406622Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.33.2\"" Jul 10 00:46:29.201168 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1378705881.mount: Deactivated successfully. Jul 10 00:46:30.073680 kubelet[1452]: E0710 00:46:30.073611 1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 00:46:30.261395 kubelet[1452]: E0710 00:46:30.258429 1452 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-dt2n5" podUID="fbc40611-2884-42cd-adda-c9271a71838c" Jul 10 00:46:30.277739 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount767770745.mount: Deactivated successfully. Jul 10 00:46:30.779498 env[1213]: time="2025-07-10T00:46:30.779429340Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.33.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 10 00:46:30.780855 env[1213]: time="2025-07-10T00:46:30.780815965Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:c26522e54bad2e6bfbb1bf11500833c94433076a3fa38436a2ec496a422c5455,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 10 00:46:30.782028 env[1213]: time="2025-07-10T00:46:30.781995466Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.33.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 10 00:46:30.783225 env[1213]: time="2025-07-10T00:46:30.783177656Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:4796ef3e43efa5ed2a5b015c18f81d3c2fe3aea36f555ea643cc01827eb65e51,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 10 00:46:30.783754 env[1213]: time="2025-07-10T00:46:30.783711514Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.33.2\" returns image reference \"sha256:c26522e54bad2e6bfbb1bf11500833c94433076a3fa38436a2ec496a422c5455\"" Jul 10 00:46:30.785050 env[1213]: time="2025-07-10T00:46:30.785017266Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.2\"" Jul 10 00:46:30.787662 env[1213]: time="2025-07-10T00:46:30.787613157Z" level=info msg="CreateContainer within sandbox \"665983cb0bc21b4485e91a825717a8dd4bc5f0b68924093ab7fd0c5de7e65436\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Jul 10 00:46:30.800860 env[1213]: time="2025-07-10T00:46:30.800803530Z" level=info msg="CreateContainer within sandbox \"665983cb0bc21b4485e91a825717a8dd4bc5f0b68924093ab7fd0c5de7e65436\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"93ab7e1b58c319aaee2d80691fa5f5721a272d38098050b9b809c0184986b4ac\"" Jul 10 00:46:30.801909 env[1213]: time="2025-07-10T00:46:30.801867729Z" level=info msg="StartContainer for \"93ab7e1b58c319aaee2d80691fa5f5721a272d38098050b9b809c0184986b4ac\"" Jul 10 00:46:30.824316 systemd[1]: Started cri-containerd-93ab7e1b58c319aaee2d80691fa5f5721a272d38098050b9b809c0184986b4ac.scope. Jul 10 00:46:30.846000 audit[1603]: AVC avc: denied { perfmon } for pid=1603 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:30.848697 kernel: kauditd_printk_skb: 357 callbacks suppressed Jul 10 00:46:30.848772 kernel: audit: type=1400 audit(1752108390.846:458): avc: denied { perfmon } for pid=1603 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:30.846000 audit[1603]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001c75a0 a2=3c a3=0 items=0 ppid=1528 pid=1603 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:46:30.854737 kernel: audit: type=1300 audit(1752108390.846:458): arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001c75a0 a2=3c a3=0 items=0 ppid=1528 pid=1603 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:46:30.854804 kernel: audit: type=1327 audit(1752108390.846:458): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3933616237653162353863333139616165653264383036393166613566 Jul 10 00:46:30.846000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3933616237653162353863333139616165653264383036393166613566 Jul 10 00:46:30.846000 audit[1603]: AVC avc: denied { bpf } for pid=1603 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:30.860511 kernel: audit: type=1400 audit(1752108390.846:459): avc: denied { bpf } for pid=1603 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:30.846000 audit[1603]: AVC avc: denied { bpf } for pid=1603 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:30.863254 kernel: audit: type=1400 audit(1752108390.846:459): avc: denied { bpf } for pid=1603 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:30.863305 kernel: audit: type=1400 audit(1752108390.846:459): avc: denied { bpf } for pid=1603 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:30.846000 audit[1603]: AVC avc: denied { bpf } for pid=1603 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:30.846000 audit[1603]: AVC avc: denied { perfmon } for pid=1603 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:30.870350 kernel: audit: type=1400 audit(1752108390.846:459): avc: denied { perfmon } for pid=1603 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:30.870450 kernel: audit: type=1400 audit(1752108390.846:459): avc: denied { perfmon } for pid=1603 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:30.846000 audit[1603]: AVC avc: denied { perfmon } for pid=1603 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:30.846000 audit[1603]: AVC avc: denied { perfmon } for pid=1603 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:30.875550 kernel: audit: type=1400 audit(1752108390.846:459): avc: denied { perfmon } for pid=1603 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:30.875624 kernel: audit: type=1400 audit(1752108390.846:459): avc: denied { perfmon } for pid=1603 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:30.846000 audit[1603]: AVC avc: denied { perfmon } for pid=1603 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:30.846000 audit[1603]: AVC avc: denied { perfmon } for pid=1603 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:30.846000 audit[1603]: AVC avc: denied { bpf } for pid=1603 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:30.846000 audit[1603]: AVC avc: denied { bpf } for pid=1603 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:30.846000 audit: BPF prog-id=66 op=LOAD Jul 10 00:46:30.846000 audit[1603]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001c78e0 a2=78 a3=0 items=0 ppid=1528 pid=1603 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:46:30.846000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3933616237653162353863333139616165653264383036393166613566 Jul 10 00:46:30.847000 audit[1603]: AVC avc: denied { bpf } for pid=1603 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:30.847000 audit[1603]: AVC avc: denied { bpf } for pid=1603 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:30.847000 audit[1603]: AVC avc: denied { perfmon } for pid=1603 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:30.847000 audit[1603]: AVC avc: denied { perfmon } for pid=1603 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:30.847000 audit[1603]: AVC avc: denied { perfmon } for pid=1603 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:30.847000 audit[1603]: AVC avc: denied { perfmon } for pid=1603 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:30.847000 audit[1603]: AVC avc: denied { perfmon } for pid=1603 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:30.847000 audit[1603]: AVC avc: denied { bpf } for pid=1603 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:30.847000 audit[1603]: AVC avc: denied { bpf } for pid=1603 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:30.847000 audit: BPF prog-id=67 op=LOAD Jul 10 00:46:30.847000 audit[1603]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=40001c7670 a2=78 a3=0 items=0 ppid=1528 pid=1603 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:46:30.847000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3933616237653162353863333139616165653264383036393166613566 Jul 10 00:46:30.849000 audit: BPF prog-id=67 op=UNLOAD Jul 10 00:46:30.849000 audit: BPF prog-id=66 op=UNLOAD Jul 10 00:46:30.849000 audit[1603]: AVC avc: denied { bpf } for pid=1603 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:30.849000 audit[1603]: AVC avc: denied { bpf } for pid=1603 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:30.849000 audit[1603]: AVC avc: denied { bpf } for pid=1603 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:30.849000 audit[1603]: AVC avc: denied { perfmon } for pid=1603 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:30.849000 audit[1603]: AVC avc: denied { perfmon } for pid=1603 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:30.849000 audit[1603]: AVC avc: denied { perfmon } for pid=1603 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:30.849000 audit[1603]: AVC avc: denied { perfmon } for pid=1603 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:30.849000 audit[1603]: AVC avc: denied { perfmon } for pid=1603 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:30.849000 audit[1603]: AVC avc: denied { bpf } for pid=1603 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:30.849000 audit[1603]: AVC avc: denied { bpf } for pid=1603 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:30.849000 audit: BPF prog-id=68 op=LOAD Jul 10 00:46:30.849000 audit[1603]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001c7b40 a2=78 a3=0 items=0 ppid=1528 pid=1603 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:46:30.849000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3933616237653162353863333139616165653264383036393166613566 Jul 10 00:46:30.885791 env[1213]: time="2025-07-10T00:46:30.885740698Z" level=info msg="StartContainer for \"93ab7e1b58c319aaee2d80691fa5f5721a272d38098050b9b809c0184986b4ac\" returns successfully" Jul 10 00:46:31.064000 audit[1665]: NETFILTER_CFG table=mangle:14 family=2 entries=1 op=nft_register_chain pid=1665 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 10 00:46:31.064000 audit[1665]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=fffff291f3c0 a2=0 a3=1 items=0 ppid=1614 pid=1665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:46:31.064000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Jul 10 00:46:31.065000 audit[1666]: NETFILTER_CFG table=mangle:15 family=10 entries=1 op=nft_register_chain pid=1666 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 10 00:46:31.065000 audit[1666]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=fffffb91e070 a2=0 a3=1 items=0 ppid=1614 pid=1666 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:46:31.065000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Jul 10 00:46:31.065000 audit[1668]: NETFILTER_CFG table=nat:16 family=2 entries=1 op=nft_register_chain pid=1668 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 10 00:46:31.065000 audit[1668]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffed7d08b0 a2=0 a3=1 items=0 ppid=1614 pid=1668 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:46:31.065000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Jul 10 00:46:31.067000 audit[1671]: NETFILTER_CFG table=filter:17 family=2 entries=1 op=nft_register_chain pid=1671 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 10 00:46:31.067000 audit[1671]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffdae265f0 a2=0 a3=1 items=0 ppid=1614 pid=1671 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:46:31.067000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Jul 10 00:46:31.067000 audit[1670]: NETFILTER_CFG table=nat:18 family=10 entries=1 op=nft_register_chain pid=1670 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 10 00:46:31.067000 audit[1670]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffc9878460 a2=0 a3=1 items=0 ppid=1614 pid=1670 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:46:31.067000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Jul 10 00:46:31.068000 audit[1673]: NETFILTER_CFG table=filter:19 family=10 entries=1 op=nft_register_chain pid=1673 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 10 00:46:31.068000 audit[1673]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffc4310460 a2=0 a3=1 items=0 ppid=1614 pid=1673 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:46:31.068000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Jul 10 00:46:31.074330 kubelet[1452]: E0710 00:46:31.074283 1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 00:46:31.170000 audit[1674]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_chain pid=1674 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 10 00:46:31.170000 audit[1674]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=108 a0=3 a1=ffffc92d7910 a2=0 a3=1 items=0 ppid=1614 pid=1674 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:46:31.170000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Jul 10 00:46:31.174000 audit[1676]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=1676 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 10 00:46:31.174000 audit[1676]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=752 a0=3 a1=ffffe9611ea0 a2=0 a3=1 items=0 ppid=1614 pid=1676 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:46:31.174000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Jul 10 00:46:31.177000 audit[1679]: NETFILTER_CFG table=filter:22 family=2 entries=2 op=nft_register_chain pid=1679 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 10 00:46:31.177000 audit[1679]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=836 a0=3 a1=ffffd3c95850 a2=0 a3=1 items=0 ppid=1614 pid=1679 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:46:31.177000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Jul 10 00:46:31.178000 audit[1680]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_chain pid=1680 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 10 00:46:31.178000 audit[1680]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffffe7f8650 a2=0 a3=1 items=0 ppid=1614 pid=1680 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:46:31.178000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Jul 10 00:46:31.181000 audit[1682]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_register_rule pid=1682 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 10 00:46:31.181000 audit[1682]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffd39228f0 a2=0 a3=1 items=0 ppid=1614 pid=1682 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:46:31.181000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Jul 10 00:46:31.182000 audit[1683]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_chain pid=1683 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 10 00:46:31.182000 audit[1683]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffd984bc30 a2=0 a3=1 items=0 ppid=1614 pid=1683 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:46:31.182000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Jul 10 00:46:31.183000 audit[1685]: NETFILTER_CFG table=filter:26 family=2 entries=1 op=nft_register_rule pid=1685 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 10 00:46:31.183000 audit[1685]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=ffffcdca41a0 a2=0 a3=1 items=0 ppid=1614 pid=1685 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:46:31.183000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Jul 10 00:46:31.186000 audit[1688]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_rule pid=1688 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 10 00:46:31.186000 audit[1688]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=ffffda219d90 a2=0 a3=1 items=0 ppid=1614 pid=1688 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:46:31.186000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 Jul 10 00:46:31.187000 audit[1689]: NETFILTER_CFG table=filter:28 family=2 entries=1 op=nft_register_chain pid=1689 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 10 00:46:31.187000 audit[1689]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffcf142190 a2=0 a3=1 items=0 ppid=1614 pid=1689 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:46:31.187000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Jul 10 00:46:31.190000 audit[1691]: NETFILTER_CFG table=filter:29 family=2 entries=1 op=nft_register_rule pid=1691 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 10 00:46:31.190000 audit[1691]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=fffff5deb380 a2=0 a3=1 items=0 ppid=1614 pid=1691 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:46:31.190000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Jul 10 00:46:31.191000 audit[1692]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_chain pid=1692 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 10 00:46:31.191000 audit[1692]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffd46d5620 a2=0 a3=1 items=0 ppid=1614 pid=1692 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:46:31.191000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Jul 10 00:46:31.193000 audit[1694]: NETFILTER_CFG table=filter:31 family=2 entries=1 op=nft_register_rule pid=1694 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 10 00:46:31.193000 audit[1694]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffe8b3c340 a2=0 a3=1 items=0 ppid=1614 pid=1694 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:46:31.193000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Jul 10 00:46:31.197000 audit[1697]: NETFILTER_CFG table=filter:32 family=2 entries=1 op=nft_register_rule pid=1697 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 10 00:46:31.197000 audit[1697]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffed98cc40 a2=0 a3=1 items=0 ppid=1614 pid=1697 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:46:31.197000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Jul 10 00:46:31.200000 audit[1700]: NETFILTER_CFG table=filter:33 family=2 entries=1 op=nft_register_rule pid=1700 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 10 00:46:31.200000 audit[1700]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=fffffebc0eb0 a2=0 a3=1 items=0 ppid=1614 pid=1700 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:46:31.200000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Jul 10 00:46:31.201000 audit[1701]: NETFILTER_CFG table=nat:34 family=2 entries=1 op=nft_register_chain pid=1701 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 10 00:46:31.201000 audit[1701]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=ffffd6351600 a2=0 a3=1 items=0 ppid=1614 pid=1701 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:46:31.201000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Jul 10 00:46:31.204000 audit[1703]: NETFILTER_CFG table=nat:35 family=2 entries=2 op=nft_register_chain pid=1703 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 10 00:46:31.204000 audit[1703]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=600 a0=3 a1=ffffe78230f0 a2=0 a3=1 items=0 ppid=1614 pid=1703 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:46:31.204000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Jul 10 00:46:31.229000 audit[1707]: NETFILTER_CFG table=nat:36 family=2 entries=2 op=nft_register_chain pid=1707 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 10 00:46:31.229000 audit[1707]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=608 a0=3 a1=ffffc6f4c9d0 a2=0 a3=1 items=0 ppid=1614 pid=1707 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:46:31.229000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Jul 10 00:46:31.230000 audit[1708]: NETFILTER_CFG table=nat:37 family=2 entries=1 op=nft_register_chain pid=1708 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 10 00:46:31.230000 audit[1708]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffca846650 a2=0 a3=1 items=0 ppid=1614 pid=1708 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:46:31.230000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Jul 10 00:46:31.233000 audit[1710]: NETFILTER_CFG table=nat:38 family=2 entries=2 op=nft_register_chain pid=1710 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 10 00:46:31.233000 audit[1710]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=612 a0=3 a1=ffffeccd0db0 a2=0 a3=1 items=0 ppid=1614 pid=1710 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:46:31.233000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Jul 10 00:46:31.254000 audit[1716]: NETFILTER_CFG table=filter:39 family=2 entries=7 op=nft_register_rule pid=1716 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 10 00:46:31.254000 audit[1716]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=4504 a0=3 a1=ffffde463db0 a2=0 a3=1 items=0 ppid=1614 pid=1716 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:46:31.254000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 10 00:46:31.268418 kubelet[1452]: E0710 00:46:31.268386 1452 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Jul 10 00:46:31.275000 audit[1716]: NETFILTER_CFG table=nat:40 family=2 entries=49 op=nft_register_chain pid=1716 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 10 00:46:31.275000 audit[1716]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=23388 a0=3 a1=ffffde463db0 a2=0 a3=1 items=0 ppid=1614 pid=1716 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:46:31.275000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 10 00:46:31.277782 systemd[1]: run-containerd-runc-k8s.io-93ab7e1b58c319aaee2d80691fa5f5721a272d38098050b9b809c0184986b4ac-runc.sTBLvk.mount: Deactivated successfully. Jul 10 00:46:31.285000 audit[1724]: NETFILTER_CFG table=filter:41 family=10 entries=1 op=nft_register_chain pid=1724 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 10 00:46:31.285000 audit[1724]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=108 a0=3 a1=fffff04f5b40 a2=0 a3=1 items=0 ppid=1614 pid=1724 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:46:31.285000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Jul 10 00:46:31.287000 audit[1726]: NETFILTER_CFG table=filter:42 family=10 entries=2 op=nft_register_chain pid=1726 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 10 00:46:31.287000 audit[1726]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=836 a0=3 a1=ffffc2ccd690 a2=0 a3=1 items=0 ppid=1614 pid=1726 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:46:31.287000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 Jul 10 00:46:31.290000 audit[1729]: NETFILTER_CFG table=filter:43 family=10 entries=2 op=nft_register_chain pid=1729 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 10 00:46:31.290000 audit[1729]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=836 a0=3 a1=ffffdcad79c0 a2=0 a3=1 items=0 ppid=1614 pid=1729 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:46:31.290000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 Jul 10 00:46:31.291000 audit[1730]: NETFILTER_CFG table=filter:44 family=10 entries=1 op=nft_register_chain pid=1730 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 10 00:46:31.291000 audit[1730]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffec4b4d70 a2=0 a3=1 items=0 ppid=1614 pid=1730 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:46:31.291000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Jul 10 00:46:31.294000 audit[1732]: NETFILTER_CFG table=filter:45 family=10 entries=1 op=nft_register_rule pid=1732 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 10 00:46:31.294000 audit[1732]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffc2708ec0 a2=0 a3=1 items=0 ppid=1614 pid=1732 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:46:31.294000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Jul 10 00:46:31.295000 audit[1733]: NETFILTER_CFG table=filter:46 family=10 entries=1 op=nft_register_chain pid=1733 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 10 00:46:31.295000 audit[1733]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffce321760 a2=0 a3=1 items=0 ppid=1614 pid=1733 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:46:31.295000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Jul 10 00:46:31.297000 audit[1735]: NETFILTER_CFG table=filter:47 family=10 entries=1 op=nft_register_rule pid=1735 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 10 00:46:31.297000 audit[1735]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=ffffcad3a250 a2=0 a3=1 items=0 ppid=1614 pid=1735 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:46:31.297000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 Jul 10 00:46:31.300000 audit[1738]: NETFILTER_CFG table=filter:48 family=10 entries=2 op=nft_register_chain pid=1738 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 10 00:46:31.300000 audit[1738]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=828 a0=3 a1=fffff2561b10 a2=0 a3=1 items=0 ppid=1614 pid=1738 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:46:31.300000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Jul 10 00:46:31.301000 audit[1739]: NETFILTER_CFG table=filter:49 family=10 entries=1 op=nft_register_chain pid=1739 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 10 00:46:31.301000 audit[1739]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffd9d1f2e0 a2=0 a3=1 items=0 ppid=1614 pid=1739 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:46:31.301000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Jul 10 00:46:31.305061 kubelet[1452]: E0710 00:46:31.305038 1452 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 10 00:46:31.305061 kubelet[1452]: W0710 00:46:31.305061 1452 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 10 00:46:31.305166 kubelet[1452]: E0710 00:46:31.305082 1452 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 10 00:46:31.305335 kubelet[1452]: E0710 00:46:31.305260 1452 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 10 00:46:31.305335 kubelet[1452]: W0710 00:46:31.305273 1452 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 10 00:46:31.305335 kubelet[1452]: E0710 00:46:31.305329 1452 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 10 00:46:31.305529 kubelet[1452]: E0710 00:46:31.305514 1452 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 10 00:46:31.305529 kubelet[1452]: W0710 00:46:31.305527 1452 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 10 00:46:31.303000 audit[1741]: NETFILTER_CFG table=filter:50 family=10 entries=1 op=nft_register_rule pid=1741 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 10 00:46:31.303000 audit[1741]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffec4cafa0 a2=0 a3=1 items=0 ppid=1614 pid=1741 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:46:31.303000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Jul 10 00:46:31.305708 kubelet[1452]: E0710 00:46:31.305537 1452 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 10 00:46:31.305708 kubelet[1452]: E0710 00:46:31.305679 1452 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 10 00:46:31.305708 kubelet[1452]: W0710 00:46:31.305687 1452 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 10 00:46:31.305708 kubelet[1452]: E0710 00:46:31.305696 1452 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 10 00:46:31.305904 kubelet[1452]: E0710 00:46:31.305890 1452 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 10 00:46:31.305904 kubelet[1452]: W0710 00:46:31.305902 1452 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 10 00:46:31.305972 kubelet[1452]: E0710 00:46:31.305910 1452 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 10 00:46:31.306078 kubelet[1452]: E0710 00:46:31.306065 1452 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 10 00:46:31.306078 kubelet[1452]: W0710 00:46:31.306075 1452 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 10 00:46:31.306154 kubelet[1452]: E0710 00:46:31.306083 1452 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 10 00:46:31.306246 kubelet[1452]: E0710 00:46:31.306234 1452 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 10 00:46:31.306246 kubelet[1452]: W0710 00:46:31.306244 1452 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 10 00:46:31.306308 kubelet[1452]: E0710 00:46:31.306251 1452 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 10 00:46:31.306432 kubelet[1452]: E0710 00:46:31.306380 1452 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 10 00:46:31.306432 kubelet[1452]: W0710 00:46:31.306390 1452 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 10 00:46:31.306432 kubelet[1452]: E0710 00:46:31.306406 1452 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 10 00:46:31.306601 kubelet[1452]: E0710 00:46:31.306586 1452 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 10 00:46:31.306601 kubelet[1452]: W0710 00:46:31.306598 1452 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 10 00:46:31.306662 kubelet[1452]: E0710 00:46:31.306607 1452 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 10 00:46:31.305000 audit[1747]: NETFILTER_CFG table=filter:51 family=10 entries=1 op=nft_register_chain pid=1747 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 10 00:46:31.305000 audit[1747]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffc689b6c0 a2=0 a3=1 items=0 ppid=1614 pid=1747 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:46:31.305000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Jul 10 00:46:31.306870 kubelet[1452]: E0710 00:46:31.306775 1452 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 10 00:46:31.306870 kubelet[1452]: W0710 00:46:31.306783 1452 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 10 00:46:31.306870 kubelet[1452]: E0710 00:46:31.306790 1452 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 10 00:46:31.306945 kubelet[1452]: E0710 00:46:31.306919 1452 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 10 00:46:31.306945 kubelet[1452]: W0710 00:46:31.306926 1452 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 10 00:46:31.306945 kubelet[1452]: E0710 00:46:31.306933 1452 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 10 00:46:31.307359 kubelet[1452]: E0710 00:46:31.307096 1452 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 10 00:46:31.307359 kubelet[1452]: W0710 00:46:31.307108 1452 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 10 00:46:31.307359 kubelet[1452]: E0710 00:46:31.307117 1452 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 10 00:46:31.307359 kubelet[1452]: E0710 00:46:31.307291 1452 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 10 00:46:31.307359 kubelet[1452]: W0710 00:46:31.307298 1452 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 10 00:46:31.307359 kubelet[1452]: E0710 00:46:31.307306 1452 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 10 00:46:31.307812 kubelet[1452]: E0710 00:46:31.307798 1452 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 10 00:46:31.307812 kubelet[1452]: W0710 00:46:31.307812 1452 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 10 00:46:31.307891 kubelet[1452]: E0710 00:46:31.307823 1452 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 10 00:46:31.308011 kubelet[1452]: E0710 00:46:31.308000 1452 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 10 00:46:31.308011 kubelet[1452]: W0710 00:46:31.308011 1452 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 10 00:46:31.308075 kubelet[1452]: E0710 00:46:31.308024 1452 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 10 00:46:31.308182 kubelet[1452]: E0710 00:46:31.308172 1452 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 10 00:46:31.308182 kubelet[1452]: W0710 00:46:31.308182 1452 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 10 00:46:31.308243 kubelet[1452]: E0710 00:46:31.308191 1452 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 10 00:46:31.308356 kubelet[1452]: E0710 00:46:31.308342 1452 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 10 00:46:31.308356 kubelet[1452]: W0710 00:46:31.308354 1452 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 10 00:46:31.308436 kubelet[1452]: E0710 00:46:31.308362 1452 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 10 00:46:31.307000 audit[1762]: NETFILTER_CFG table=filter:52 family=10 entries=1 op=nft_register_rule pid=1762 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 10 00:46:31.307000 audit[1762]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffcf5ec2f0 a2=0 a3=1 items=0 ppid=1614 pid=1762 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:46:31.307000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Jul 10 00:46:31.309602 kubelet[1452]: E0710 00:46:31.309555 1452 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 10 00:46:31.309602 kubelet[1452]: W0710 00:46:31.309576 1452 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 10 00:46:31.309602 kubelet[1452]: E0710 00:46:31.309599 1452 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 10 00:46:31.309806 kubelet[1452]: E0710 00:46:31.309795 1452 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 10 00:46:31.309806 kubelet[1452]: W0710 00:46:31.309806 1452 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 10 00:46:31.309867 kubelet[1452]: E0710 00:46:31.309816 1452 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 10 00:46:31.309990 kubelet[1452]: E0710 00:46:31.309979 1452 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 10 00:46:31.309990 kubelet[1452]: W0710 00:46:31.309989 1452 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 10 00:46:31.310041 kubelet[1452]: E0710 00:46:31.309997 1452 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 10 00:46:31.310237 kubelet[1452]: E0710 00:46:31.310216 1452 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 10 00:46:31.310237 kubelet[1452]: W0710 00:46:31.310228 1452 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 10 00:46:31.310237 kubelet[1452]: E0710 00:46:31.310237 1452 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 10 00:46:31.310490 kubelet[1452]: E0710 00:46:31.310475 1452 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 10 00:46:31.310538 kubelet[1452]: W0710 00:46:31.310490 1452 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 10 00:46:31.310538 kubelet[1452]: E0710 00:46:31.310516 1452 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 10 00:46:31.310771 kubelet[1452]: E0710 00:46:31.310758 1452 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 10 00:46:31.310771 kubelet[1452]: W0710 00:46:31.310770 1452 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 10 00:46:31.310848 kubelet[1452]: E0710 00:46:31.310779 1452 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 10 00:46:31.310973 kubelet[1452]: E0710 00:46:31.310962 1452 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 10 00:46:31.310973 kubelet[1452]: W0710 00:46:31.310973 1452 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 10 00:46:31.311033 kubelet[1452]: E0710 00:46:31.310982 1452 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 10 00:46:31.311137 kubelet[1452]: E0710 00:46:31.311120 1452 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 10 00:46:31.311137 kubelet[1452]: W0710 00:46:31.311131 1452 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 10 00:46:31.311188 kubelet[1452]: E0710 00:46:31.311139 1452 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 10 00:46:31.311304 kubelet[1452]: E0710 00:46:31.311293 1452 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 10 00:46:31.311304 kubelet[1452]: W0710 00:46:31.311304 1452 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 10 00:46:31.311379 kubelet[1452]: E0710 00:46:31.311314 1452 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 10 00:46:31.311807 kubelet[1452]: E0710 00:46:31.311691 1452 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 10 00:46:31.311807 kubelet[1452]: W0710 00:46:31.311708 1452 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 10 00:46:31.311807 kubelet[1452]: E0710 00:46:31.311727 1452 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 10 00:46:31.312069 kubelet[1452]: E0710 00:46:31.311963 1452 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 10 00:46:31.312069 kubelet[1452]: W0710 00:46:31.311975 1452 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 10 00:46:31.312069 kubelet[1452]: E0710 00:46:31.311986 1452 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 10 00:46:31.312376 kubelet[1452]: E0710 00:46:31.312236 1452 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 10 00:46:31.312376 kubelet[1452]: W0710 00:46:31.312249 1452 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 10 00:46:31.312376 kubelet[1452]: E0710 00:46:31.312260 1452 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 10 00:46:31.312744 kubelet[1452]: E0710 00:46:31.312549 1452 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 10 00:46:31.312744 kubelet[1452]: W0710 00:46:31.312561 1452 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 10 00:46:31.312744 kubelet[1452]: E0710 00:46:31.312572 1452 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 10 00:46:31.312857 kubelet[1452]: E0710 00:46:31.312807 1452 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 10 00:46:31.312857 kubelet[1452]: W0710 00:46:31.312819 1452 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 10 00:46:31.312857 kubelet[1452]: E0710 00:46:31.312830 1452 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 10 00:46:31.311000 audit[1774]: NETFILTER_CFG table=filter:53 family=10 entries=1 op=nft_register_rule pid=1774 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 10 00:46:31.311000 audit[1774]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffce578b80 a2=0 a3=1 items=0 ppid=1614 pid=1774 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:46:31.311000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Jul 10 00:46:31.313044 kubelet[1452]: E0710 00:46:31.312992 1452 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 10 00:46:31.313044 kubelet[1452]: W0710 00:46:31.313001 1452 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 10 00:46:31.313044 kubelet[1452]: E0710 00:46:31.313010 1452 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 10 00:46:31.314000 audit[1782]: NETFILTER_CFG table=filter:54 family=10 entries=1 op=nft_register_rule pid=1782 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 10 00:46:31.314000 audit[1782]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffc07845b0 a2=0 a3=1 items=0 ppid=1614 pid=1782 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:46:31.314000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C Jul 10 00:46:31.315000 audit[1783]: NETFILTER_CFG table=nat:55 family=10 entries=1 op=nft_register_chain pid=1783 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 10 00:46:31.315000 audit[1783]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=ffffc9e0ef50 a2=0 a3=1 items=0 ppid=1614 pid=1783 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:46:31.315000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Jul 10 00:46:31.317000 audit[1785]: NETFILTER_CFG table=nat:56 family=10 entries=2 op=nft_register_chain pid=1785 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 10 00:46:31.317000 audit[1785]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=600 a0=3 a1=ffffc42bdd70 a2=0 a3=1 items=0 ppid=1614 pid=1785 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:46:31.317000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Jul 10 00:46:31.320000 audit[1788]: NETFILTER_CFG table=nat:57 family=10 entries=2 op=nft_register_chain pid=1788 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 10 00:46:31.320000 audit[1788]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=608 a0=3 a1=ffffffacd130 a2=0 a3=1 items=0 ppid=1614 pid=1788 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:46:31.320000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Jul 10 00:46:31.321000 audit[1789]: NETFILTER_CFG table=nat:58 family=10 entries=1 op=nft_register_chain pid=1789 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 10 00:46:31.321000 audit[1789]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffe57cb9c0 a2=0 a3=1 items=0 ppid=1614 pid=1789 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:46:31.321000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Jul 10 00:46:31.323000 audit[1791]: NETFILTER_CFG table=nat:59 family=10 entries=2 op=nft_register_chain pid=1791 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 10 00:46:31.323000 audit[1791]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=612 a0=3 a1=ffffd564c0b0 a2=0 a3=1 items=0 ppid=1614 pid=1791 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:46:31.323000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Jul 10 00:46:31.324000 audit[1792]: NETFILTER_CFG table=filter:60 family=10 entries=1 op=nft_register_chain pid=1792 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 10 00:46:31.324000 audit[1792]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffe3a454e0 a2=0 a3=1 items=0 ppid=1614 pid=1792 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:46:31.324000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Jul 10 00:46:31.328000 audit[1794]: NETFILTER_CFG table=filter:61 family=10 entries=1 op=nft_register_rule pid=1794 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 10 00:46:31.328000 audit[1794]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=ffffe94fcdc0 a2=0 a3=1 items=0 ppid=1614 pid=1794 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:46:31.328000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Jul 10 00:46:31.332000 audit[1797]: NETFILTER_CFG table=filter:62 family=10 entries=1 op=nft_register_rule pid=1797 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 10 00:46:31.332000 audit[1797]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=ffffe70b9a70 a2=0 a3=1 items=0 ppid=1614 pid=1797 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:46:31.332000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Jul 10 00:46:31.335000 audit[1799]: NETFILTER_CFG table=filter:63 family=10 entries=3 op=nft_register_rule pid=1799 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Jul 10 00:46:31.335000 audit[1799]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2088 a0=3 a1=fffff2a7bb70 a2=0 a3=1 items=0 ppid=1614 pid=1799 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:46:31.335000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 10 00:46:31.335000 audit[1799]: NETFILTER_CFG table=nat:64 family=10 entries=7 op=nft_register_chain pid=1799 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Jul 10 00:46:31.335000 audit[1799]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2056 a0=3 a1=fffff2a7bb70 a2=0 a3=1 items=0 ppid=1614 pid=1799 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:46:31.335000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 10 00:46:31.439000 audit[1801]: NETFILTER_CFG table=filter:65 family=2 entries=12 op=nft_register_rule pid=1801 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 10 00:46:31.439000 audit[1801]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=4504 a0=3 a1=fffffb2774b0 a2=0 a3=1 items=0 ppid=1614 pid=1801 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:46:31.439000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 10 00:46:31.446000 audit[1801]: NETFILTER_CFG table=nat:66 family=2 entries=46 op=nft_register_rule pid=1801 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 10 00:46:31.446000 audit[1801]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=14964 a0=3 a1=fffffb2774b0 a2=0 a3=1 items=0 ppid=1614 pid=1801 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:46:31.446000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 10 00:46:31.659280 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3920626038.mount: Deactivated successfully. Jul 10 00:46:31.758988 env[1213]: time="2025-07-10T00:46:31.758940044Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 10 00:46:31.760519 env[1213]: time="2025-07-10T00:46:31.760448451Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:53f638101e3d73f7dd5e42dc42fb3d94ae1978e8958677222c3de6ec1d8c3d4f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 10 00:46:31.762420 env[1213]: time="2025-07-10T00:46:31.762372596Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 10 00:46:31.768966 env[1213]: time="2025-07-10T00:46:31.768808661Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:972be127eaecd7d1a2d5393b8d14f1ae8f88550bee83e0519e9590c7e15eb41b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 10 00:46:31.769955 env[1213]: time="2025-07-10T00:46:31.769215889Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.2\" returns image reference \"sha256:53f638101e3d73f7dd5e42dc42fb3d94ae1978e8958677222c3de6ec1d8c3d4f\"" Jul 10 00:46:31.778387 env[1213]: time="2025-07-10T00:46:31.778329630Z" level=info msg="CreateContainer within sandbox \"ab31316125bba65acb94a2b36ebd79a7a8a41f9258a7c3fe6e7143b2b7196482\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Jul 10 00:46:31.788030 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3889040892.mount: Deactivated successfully. Jul 10 00:46:31.790996 env[1213]: time="2025-07-10T00:46:31.790932572Z" level=info msg="CreateContainer within sandbox \"ab31316125bba65acb94a2b36ebd79a7a8a41f9258a7c3fe6e7143b2b7196482\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"3c45fffb234981266121d1917bdcf496379ef3f227549433915dd3e5f99b2875\"" Jul 10 00:46:31.791553 env[1213]: time="2025-07-10T00:46:31.791524430Z" level=info msg="StartContainer for \"3c45fffb234981266121d1917bdcf496379ef3f227549433915dd3e5f99b2875\"" Jul 10 00:46:31.806954 systemd[1]: Started cri-containerd-3c45fffb234981266121d1917bdcf496379ef3f227549433915dd3e5f99b2875.scope. Jul 10 00:46:31.834000 audit[1809]: AVC avc: denied { perfmon } for pid=1809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:31.834000 audit[1809]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=1529 pid=1809 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:46:31.834000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3363343566666662323334393831323636313231643139313762646366 Jul 10 00:46:31.834000 audit[1809]: AVC avc: denied { bpf } for pid=1809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:31.834000 audit[1809]: AVC avc: denied { bpf } for pid=1809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:31.834000 audit[1809]: AVC avc: denied { bpf } for pid=1809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:31.834000 audit[1809]: AVC avc: denied { perfmon } for pid=1809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:31.834000 audit[1809]: AVC avc: denied { perfmon } for pid=1809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:31.834000 audit[1809]: AVC avc: denied { perfmon } for pid=1809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:31.834000 audit[1809]: AVC avc: denied { perfmon } for pid=1809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:31.834000 audit[1809]: AVC avc: denied { perfmon } for pid=1809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:31.834000 audit[1809]: AVC avc: denied { bpf } for pid=1809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:31.834000 audit[1809]: AVC avc: denied { bpf } for pid=1809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:31.834000 audit: BPF prog-id=69 op=LOAD Jul 10 00:46:31.834000 audit[1809]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=1529 pid=1809 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:46:31.834000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3363343566666662323334393831323636313231643139313762646366 Jul 10 00:46:31.834000 audit[1809]: AVC avc: denied { bpf } for pid=1809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:31.834000 audit[1809]: AVC avc: denied { bpf } for pid=1809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:31.834000 audit[1809]: AVC avc: denied { perfmon } for pid=1809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:31.834000 audit[1809]: AVC avc: denied { perfmon } for pid=1809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:31.834000 audit[1809]: AVC avc: denied { perfmon } for pid=1809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:31.834000 audit[1809]: AVC avc: denied { perfmon } for pid=1809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:31.834000 audit[1809]: AVC avc: denied { perfmon } for pid=1809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:31.834000 audit[1809]: AVC avc: denied { bpf } for pid=1809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:31.834000 audit[1809]: AVC avc: denied { bpf } for pid=1809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:31.834000 audit: BPF prog-id=70 op=LOAD Jul 10 00:46:31.834000 audit[1809]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=1529 pid=1809 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:46:31.834000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3363343566666662323334393831323636313231643139313762646366 Jul 10 00:46:31.834000 audit: BPF prog-id=70 op=UNLOAD Jul 10 00:46:31.834000 audit: BPF prog-id=69 op=UNLOAD Jul 10 00:46:31.834000 audit[1809]: AVC avc: denied { bpf } for pid=1809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:31.834000 audit[1809]: AVC avc: denied { bpf } for pid=1809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:31.834000 audit[1809]: AVC avc: denied { bpf } for pid=1809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:31.834000 audit[1809]: AVC avc: denied { perfmon } for pid=1809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:31.834000 audit[1809]: AVC avc: denied { perfmon } for pid=1809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:31.834000 audit[1809]: AVC avc: denied { perfmon } for pid=1809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:31.834000 audit[1809]: AVC avc: denied { perfmon } for pid=1809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:31.834000 audit[1809]: AVC avc: denied { perfmon } for pid=1809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:31.834000 audit[1809]: AVC avc: denied { bpf } for pid=1809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:31.834000 audit[1809]: AVC avc: denied { bpf } for pid=1809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:31.834000 audit: BPF prog-id=71 op=LOAD Jul 10 00:46:31.834000 audit[1809]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=1529 pid=1809 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:46:31.834000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3363343566666662323334393831323636313231643139313762646366 Jul 10 00:46:31.859388 env[1213]: time="2025-07-10T00:46:31.857641104Z" level=info msg="StartContainer for \"3c45fffb234981266121d1917bdcf496379ef3f227549433915dd3e5f99b2875\" returns successfully" Jul 10 00:46:31.878333 systemd[1]: cri-containerd-3c45fffb234981266121d1917bdcf496379ef3f227549433915dd3e5f99b2875.scope: Deactivated successfully. Jul 10 00:46:31.881000 audit: BPF prog-id=71 op=UNLOAD Jul 10 00:46:32.045214 env[1213]: time="2025-07-10T00:46:32.045086939Z" level=info msg="shim disconnected" id=3c45fffb234981266121d1917bdcf496379ef3f227549433915dd3e5f99b2875 Jul 10 00:46:32.045214 env[1213]: time="2025-07-10T00:46:32.045131730Z" level=warning msg="cleaning up after shim disconnected" id=3c45fffb234981266121d1917bdcf496379ef3f227549433915dd3e5f99b2875 namespace=k8s.io Jul 10 00:46:32.045214 env[1213]: time="2025-07-10T00:46:32.045141640Z" level=info msg="cleaning up dead shim" Jul 10 00:46:32.052384 env[1213]: time="2025-07-10T00:46:32.052324250Z" level=warning msg="cleanup warnings time=\"2025-07-10T00:46:32Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=1847 runtime=io.containerd.runc.v2\n" Jul 10 00:46:32.074917 kubelet[1452]: E0710 00:46:32.074860 1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 00:46:32.258237 kubelet[1452]: E0710 00:46:32.258183 1452 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-dt2n5" podUID="fbc40611-2884-42cd-adda-c9271a71838c" Jul 10 00:46:32.270423 kubelet[1452]: E0710 00:46:32.270369 1452 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Jul 10 00:46:32.271580 env[1213]: time="2025-07-10T00:46:32.271547476Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.30.2\"" Jul 10 00:46:32.285065 kubelet[1452]: I0710 00:46:32.284990 1452 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-proxy-8hqt4" podStartSLOduration=3.671356102 podStartE2EDuration="5.284969029s" podCreationTimestamp="2025-07-10 00:46:27 +0000 UTC" firstStartedPulling="2025-07-10 00:46:29.170892576 +0000 UTC m=+2.865997573" lastFinishedPulling="2025-07-10 00:46:30.784505464 +0000 UTC m=+4.479610500" observedRunningTime="2025-07-10 00:46:31.280677001 +0000 UTC m=+4.975782037" watchObservedRunningTime="2025-07-10 00:46:32.284969029 +0000 UTC m=+5.980074066" Jul 10 00:46:32.460000 audit[1866]: NETFILTER_CFG table=filter:67 family=2 entries=12 op=nft_register_rule pid=1866 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 10 00:46:32.460000 audit[1866]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=4504 a0=3 a1=ffffde04b380 a2=0 a3=1 items=0 ppid=1614 pid=1866 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:46:32.460000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 10 00:46:32.476000 audit[1866]: NETFILTER_CFG table=nat:68 family=2 entries=58 op=nft_register_chain pid=1866 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 10 00:46:32.476000 audit[1866]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=20628 a0=3 a1=ffffde04b380 a2=0 a3=1 items=0 ppid=1614 pid=1866 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:46:32.476000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 10 00:46:33.075290 kubelet[1452]: E0710 00:46:33.075242 1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 00:46:33.416000 audit[1869]: NETFILTER_CFG table=filter:69 family=2 entries=12 op=nft_register_rule pid=1869 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 10 00:46:33.416000 audit[1869]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=4504 a0=3 a1=ffffff8e5980 a2=0 a3=1 items=0 ppid=1614 pid=1869 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:46:33.416000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 10 00:46:33.424000 audit[1869]: NETFILTER_CFG table=nat:70 family=2 entries=22 op=nft_register_rule pid=1869 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 10 00:46:33.424000 audit[1869]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6540 a0=3 a1=ffffff8e5980 a2=0 a3=1 items=0 ppid=1614 pid=1869 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:46:33.424000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 10 00:46:34.075426 kubelet[1452]: E0710 00:46:34.075376 1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 00:46:34.258528 kubelet[1452]: E0710 00:46:34.258434 1452 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-dt2n5" podUID="fbc40611-2884-42cd-adda-c9271a71838c" Jul 10 00:46:34.424816 env[1213]: time="2025-07-10T00:46:34.424703208Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.30.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 10 00:46:34.426337 env[1213]: time="2025-07-10T00:46:34.426282437Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:f6e344d58b3c5524e767c7d1dd4cb29c85ce820b0f3005a603532b6a22db5588,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 10 00:46:34.427572 env[1213]: time="2025-07-10T00:46:34.427541459Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.30.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 10 00:46:34.428843 env[1213]: time="2025-07-10T00:46:34.428800083Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:50686775cc60acb78bd92a66fa2d84e1700b2d8e43a718fbadbf35e59baefb4d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 10 00:46:34.429460 env[1213]: time="2025-07-10T00:46:34.429427271Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.30.2\" returns image reference \"sha256:f6e344d58b3c5524e767c7d1dd4cb29c85ce820b0f3005a603532b6a22db5588\"" Jul 10 00:46:34.433141 env[1213]: time="2025-07-10T00:46:34.433090370Z" level=info msg="CreateContainer within sandbox \"ab31316125bba65acb94a2b36ebd79a7a8a41f9258a7c3fe6e7143b2b7196482\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Jul 10 00:46:34.439000 audit[1871]: NETFILTER_CFG table=filter:71 family=2 entries=12 op=nft_register_rule pid=1871 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 10 00:46:34.439000 audit[1871]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=4504 a0=3 a1=fffff14a8de0 a2=0 a3=1 items=0 ppid=1614 pid=1871 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:46:34.439000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 10 00:46:34.446332 env[1213]: time="2025-07-10T00:46:34.446281081Z" level=info msg="CreateContainer within sandbox \"ab31316125bba65acb94a2b36ebd79a7a8a41f9258a7c3fe6e7143b2b7196482\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"a087f55c75c771850ef2e973d827b804a0ab4fdd772e9fe615190157e038250a\"" Jul 10 00:46:34.445000 audit[1871]: NETFILTER_CFG table=nat:72 family=2 entries=22 op=nft_register_rule pid=1871 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 10 00:46:34.445000 audit[1871]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6540 a0=3 a1=fffff14a8de0 a2=0 a3=1 items=0 ppid=1614 pid=1871 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:46:34.445000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 10 00:46:34.447096 env[1213]: time="2025-07-10T00:46:34.447066883Z" level=info msg="StartContainer for \"a087f55c75c771850ef2e973d827b804a0ab4fdd772e9fe615190157e038250a\"" Jul 10 00:46:34.467448 systemd[1]: run-containerd-runc-k8s.io-a087f55c75c771850ef2e973d827b804a0ab4fdd772e9fe615190157e038250a-runc.KxTInn.mount: Deactivated successfully. Jul 10 00:46:34.468864 systemd[1]: Started cri-containerd-a087f55c75c771850ef2e973d827b804a0ab4fdd772e9fe615190157e038250a.scope. Jul 10 00:46:34.496000 audit[1880]: AVC avc: denied { perfmon } for pid=1880 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:34.496000 audit[1880]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=1529 pid=1880 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:46:34.496000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6130383766353563373563373731383530656632653937336438323762 Jul 10 00:46:34.496000 audit[1880]: AVC avc: denied { bpf } for pid=1880 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:34.496000 audit[1880]: AVC avc: denied { bpf } for pid=1880 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:34.496000 audit[1880]: AVC avc: denied { bpf } for pid=1880 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:34.496000 audit[1880]: AVC avc: denied { perfmon } for pid=1880 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:34.496000 audit[1880]: AVC avc: denied { perfmon } for pid=1880 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:34.496000 audit[1880]: AVC avc: denied { perfmon } for pid=1880 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:34.496000 audit[1880]: AVC avc: denied { perfmon } for pid=1880 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:34.496000 audit[1880]: AVC avc: denied { perfmon } for pid=1880 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:34.496000 audit[1880]: AVC avc: denied { bpf } for pid=1880 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:34.496000 audit[1880]: AVC avc: denied { bpf } for pid=1880 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:34.496000 audit: BPF prog-id=72 op=LOAD Jul 10 00:46:34.496000 audit[1880]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=1529 pid=1880 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:46:34.496000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6130383766353563373563373731383530656632653937336438323762 Jul 10 00:46:34.496000 audit[1880]: AVC avc: denied { bpf } for pid=1880 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:34.496000 audit[1880]: AVC avc: denied { bpf } for pid=1880 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:34.496000 audit[1880]: AVC avc: denied { perfmon } for pid=1880 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:34.496000 audit[1880]: AVC avc: denied { perfmon } for pid=1880 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:34.496000 audit[1880]: AVC avc: denied { perfmon } for pid=1880 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:34.496000 audit[1880]: AVC avc: denied { perfmon } for pid=1880 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:34.496000 audit[1880]: AVC avc: denied { perfmon } for pid=1880 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:34.496000 audit[1880]: AVC avc: denied { bpf } for pid=1880 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:34.496000 audit[1880]: AVC avc: denied { bpf } for pid=1880 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:34.496000 audit: BPF prog-id=73 op=LOAD Jul 10 00:46:34.496000 audit[1880]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=1529 pid=1880 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:46:34.496000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6130383766353563373563373731383530656632653937336438323762 Jul 10 00:46:34.496000 audit: BPF prog-id=73 op=UNLOAD Jul 10 00:46:34.496000 audit: BPF prog-id=72 op=UNLOAD Jul 10 00:46:34.496000 audit[1880]: AVC avc: denied { bpf } for pid=1880 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:34.496000 audit[1880]: AVC avc: denied { bpf } for pid=1880 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:34.496000 audit[1880]: AVC avc: denied { bpf } for pid=1880 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:34.496000 audit[1880]: AVC avc: denied { perfmon } for pid=1880 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:34.496000 audit[1880]: AVC avc: denied { perfmon } for pid=1880 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:34.496000 audit[1880]: AVC avc: denied { perfmon } for pid=1880 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:34.496000 audit[1880]: AVC avc: denied { perfmon } for pid=1880 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:34.496000 audit[1880]: AVC avc: denied { perfmon } for pid=1880 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:34.496000 audit[1880]: AVC avc: denied { bpf } for pid=1880 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:34.496000 audit[1880]: AVC avc: denied { bpf } for pid=1880 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:34.496000 audit: BPF prog-id=74 op=LOAD Jul 10 00:46:34.496000 audit[1880]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=1529 pid=1880 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:46:34.496000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6130383766353563373563373731383530656632653937336438323762 Jul 10 00:46:34.512129 env[1213]: time="2025-07-10T00:46:34.512078246Z" level=info msg="StartContainer for \"a087f55c75c771850ef2e973d827b804a0ab4fdd772e9fe615190157e038250a\" returns successfully" Jul 10 00:46:35.056876 env[1213]: time="2025-07-10T00:46:35.056815303Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Jul 10 00:46:35.058982 systemd[1]: cri-containerd-a087f55c75c771850ef2e973d827b804a0ab4fdd772e9fe615190157e038250a.scope: Deactivated successfully. Jul 10 00:46:35.063000 audit: BPF prog-id=74 op=UNLOAD Jul 10 00:46:35.075766 kubelet[1452]: E0710 00:46:35.075507 1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 00:46:35.084316 kubelet[1452]: I0710 00:46:35.083738 1452 kubelet_node_status.go:501] "Fast updating node status as it just became ready" Jul 10 00:46:35.254644 env[1213]: time="2025-07-10T00:46:35.254582947Z" level=info msg="shim disconnected" id=a087f55c75c771850ef2e973d827b804a0ab4fdd772e9fe615190157e038250a Jul 10 00:46:35.254644 env[1213]: time="2025-07-10T00:46:35.254634870Z" level=warning msg="cleaning up after shim disconnected" id=a087f55c75c771850ef2e973d827b804a0ab4fdd772e9fe615190157e038250a namespace=k8s.io Jul 10 00:46:35.254644 env[1213]: time="2025-07-10T00:46:35.254646082Z" level=info msg="cleaning up dead shim" Jul 10 00:46:35.261436 env[1213]: time="2025-07-10T00:46:35.261370136Z" level=warning msg="cleanup warnings time=\"2025-07-10T00:46:35Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=1921 runtime=io.containerd.runc.v2\n" Jul 10 00:46:35.276390 env[1213]: time="2025-07-10T00:46:35.276308083Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.30.2\"" Jul 10 00:46:35.442640 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-a087f55c75c771850ef2e973d827b804a0ab4fdd772e9fe615190157e038250a-rootfs.mount: Deactivated successfully. Jul 10 00:46:36.075922 kubelet[1452]: E0710 00:46:36.075877 1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 00:46:36.264752 systemd[1]: Created slice kubepods-besteffort-podfbc40611_2884_42cd_adda_c9271a71838c.slice. Jul 10 00:46:36.267346 env[1213]: time="2025-07-10T00:46:36.267285460Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-dt2n5,Uid:fbc40611-2884-42cd-adda-c9271a71838c,Namespace:calico-system,Attempt:0,}" Jul 10 00:46:36.389251 env[1213]: time="2025-07-10T00:46:36.388870402Z" level=error msg="Failed to destroy network for sandbox \"2d2cd167f9c6b9b991d7d79bcb3dafcd87891599405039ba1f4af331897876fd\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 10 00:46:36.390323 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-2d2cd167f9c6b9b991d7d79bcb3dafcd87891599405039ba1f4af331897876fd-shm.mount: Deactivated successfully. Jul 10 00:46:36.391371 env[1213]: time="2025-07-10T00:46:36.391303396Z" level=error msg="encountered an error cleaning up failed sandbox \"2d2cd167f9c6b9b991d7d79bcb3dafcd87891599405039ba1f4af331897876fd\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 10 00:46:36.391471 env[1213]: time="2025-07-10T00:46:36.391382335Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-dt2n5,Uid:fbc40611-2884-42cd-adda-c9271a71838c,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"2d2cd167f9c6b9b991d7d79bcb3dafcd87891599405039ba1f4af331897876fd\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 10 00:46:36.391670 kubelet[1452]: E0710 00:46:36.391626 1452 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"2d2cd167f9c6b9b991d7d79bcb3dafcd87891599405039ba1f4af331897876fd\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 10 00:46:36.391753 kubelet[1452]: E0710 00:46:36.391723 1452 kuberuntime_sandbox.go:70] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"2d2cd167f9c6b9b991d7d79bcb3dafcd87891599405039ba1f4af331897876fd\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-dt2n5" Jul 10 00:46:36.391798 kubelet[1452]: E0710 00:46:36.391758 1452 kuberuntime_manager.go:1252] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"2d2cd167f9c6b9b991d7d79bcb3dafcd87891599405039ba1f4af331897876fd\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-dt2n5" Jul 10 00:46:36.392085 kubelet[1452]: E0710 00:46:36.391811 1452 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-dt2n5_calico-system(fbc40611-2884-42cd-adda-c9271a71838c)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-dt2n5_calico-system(fbc40611-2884-42cd-adda-c9271a71838c)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"2d2cd167f9c6b9b991d7d79bcb3dafcd87891599405039ba1f4af331897876fd\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-dt2n5" podUID="fbc40611-2884-42cd-adda-c9271a71838c" Jul 10 00:46:37.076624 kubelet[1452]: E0710 00:46:37.076575 1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 00:46:37.279016 kubelet[1452]: I0710 00:46:37.278968 1452 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="2d2cd167f9c6b9b991d7d79bcb3dafcd87891599405039ba1f4af331897876fd" Jul 10 00:46:37.279839 env[1213]: time="2025-07-10T00:46:37.279800639Z" level=info msg="StopPodSandbox for \"2d2cd167f9c6b9b991d7d79bcb3dafcd87891599405039ba1f4af331897876fd\"" Jul 10 00:46:37.303262 env[1213]: time="2025-07-10T00:46:37.303200432Z" level=error msg="StopPodSandbox for \"2d2cd167f9c6b9b991d7d79bcb3dafcd87891599405039ba1f4af331897876fd\" failed" error="failed to destroy network for sandbox \"2d2cd167f9c6b9b991d7d79bcb3dafcd87891599405039ba1f4af331897876fd\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 10 00:46:37.303685 kubelet[1452]: E0710 00:46:37.303643 1452 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"2d2cd167f9c6b9b991d7d79bcb3dafcd87891599405039ba1f4af331897876fd\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="2d2cd167f9c6b9b991d7d79bcb3dafcd87891599405039ba1f4af331897876fd" Jul 10 00:46:37.303763 kubelet[1452]: E0710 00:46:37.303713 1452 kuberuntime_manager.go:1586] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"2d2cd167f9c6b9b991d7d79bcb3dafcd87891599405039ba1f4af331897876fd"} Jul 10 00:46:37.303794 kubelet[1452]: E0710 00:46:37.303773 1452 kuberuntime_manager.go:1161] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"fbc40611-2884-42cd-adda-c9271a71838c\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"2d2cd167f9c6b9b991d7d79bcb3dafcd87891599405039ba1f4af331897876fd\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Jul 10 00:46:37.303849 kubelet[1452]: E0710 00:46:37.303796 1452 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"fbc40611-2884-42cd-adda-c9271a71838c\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"2d2cd167f9c6b9b991d7d79bcb3dafcd87891599405039ba1f4af331897876fd\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-dt2n5" podUID="fbc40611-2884-42cd-adda-c9271a71838c" Jul 10 00:46:38.076878 kubelet[1452]: E0710 00:46:38.076830 1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 00:46:39.013087 systemd[1]: Created slice kubepods-besteffort-podfdc3a8e0_bfc3_4e7f_b4f3_888e75fa02b2.slice. Jul 10 00:46:39.077405 kubelet[1452]: E0710 00:46:39.077356 1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 00:46:39.151597 kubelet[1452]: I0710 00:46:39.151556 1452 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-k5g97\" (UniqueName: \"kubernetes.io/projected/fdc3a8e0-bfc3-4e7f-b4f3-888e75fa02b2-kube-api-access-k5g97\") pod \"nginx-deployment-7fcdb87857-pl76q\" (UID: \"fdc3a8e0-bfc3-4e7f-b4f3-888e75fa02b2\") " pod="default/nginx-deployment-7fcdb87857-pl76q" Jul 10 00:46:39.316632 env[1213]: time="2025-07-10T00:46:39.316267581Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-7fcdb87857-pl76q,Uid:fdc3a8e0-bfc3-4e7f-b4f3-888e75fa02b2,Namespace:default,Attempt:0,}" Jul 10 00:46:39.375695 env[1213]: time="2025-07-10T00:46:39.375636509Z" level=error msg="Failed to destroy network for sandbox \"0ee534bb64d3850032788c287ce53841e20507b5b250d188dcd872c2645c9472\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 10 00:46:39.376244 env[1213]: time="2025-07-10T00:46:39.376205840Z" level=error msg="encountered an error cleaning up failed sandbox \"0ee534bb64d3850032788c287ce53841e20507b5b250d188dcd872c2645c9472\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 10 00:46:39.376375 env[1213]: time="2025-07-10T00:46:39.376347893Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-7fcdb87857-pl76q,Uid:fdc3a8e0-bfc3-4e7f-b4f3-888e75fa02b2,Namespace:default,Attempt:0,} failed, error" error="failed to setup network for sandbox \"0ee534bb64d3850032788c287ce53841e20507b5b250d188dcd872c2645c9472\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 10 00:46:39.377372 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-0ee534bb64d3850032788c287ce53841e20507b5b250d188dcd872c2645c9472-shm.mount: Deactivated successfully. Jul 10 00:46:39.378149 kubelet[1452]: E0710 00:46:39.378104 1452 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"0ee534bb64d3850032788c287ce53841e20507b5b250d188dcd872c2645c9472\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 10 00:46:39.378242 kubelet[1452]: E0710 00:46:39.378170 1452 kuberuntime_sandbox.go:70] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"0ee534bb64d3850032788c287ce53841e20507b5b250d188dcd872c2645c9472\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-7fcdb87857-pl76q" Jul 10 00:46:39.378242 kubelet[1452]: E0710 00:46:39.378199 1452 kuberuntime_manager.go:1252] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"0ee534bb64d3850032788c287ce53841e20507b5b250d188dcd872c2645c9472\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-7fcdb87857-pl76q" Jul 10 00:46:39.378299 kubelet[1452]: E0710 00:46:39.378250 1452 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"nginx-deployment-7fcdb87857-pl76q_default(fdc3a8e0-bfc3-4e7f-b4f3-888e75fa02b2)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"nginx-deployment-7fcdb87857-pl76q_default(fdc3a8e0-bfc3-4e7f-b4f3-888e75fa02b2)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"0ee534bb64d3850032788c287ce53841e20507b5b250d188dcd872c2645c9472\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-7fcdb87857-pl76q" podUID="fdc3a8e0-bfc3-4e7f-b4f3-888e75fa02b2" Jul 10 00:46:39.595611 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1709321347.mount: Deactivated successfully. Jul 10 00:46:39.727007 env[1213]: time="2025-07-10T00:46:39.726959542Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.30.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 10 00:46:39.728539 env[1213]: time="2025-07-10T00:46:39.728487576Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:1c6ddca599ddd18c061e797a7830b0aea985f8b023c5e43d815a9ed1088893a9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 10 00:46:39.732781 env[1213]: time="2025-07-10T00:46:39.732751898Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.30.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 10 00:46:39.734255 env[1213]: time="2025-07-10T00:46:39.734226204Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:e94d49349cc361ef2216d27dda4a097278984d778279f66e79b0616c827c6760,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 10 00:46:39.734618 env[1213]: time="2025-07-10T00:46:39.734587875Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.30.2\" returns image reference \"sha256:1c6ddca599ddd18c061e797a7830b0aea985f8b023c5e43d815a9ed1088893a9\"" Jul 10 00:46:39.743102 env[1213]: time="2025-07-10T00:46:39.743067892Z" level=info msg="CreateContainer within sandbox \"ab31316125bba65acb94a2b36ebd79a7a8a41f9258a7c3fe6e7143b2b7196482\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Jul 10 00:46:39.752629 env[1213]: time="2025-07-10T00:46:39.752593343Z" level=info msg="CreateContainer within sandbox \"ab31316125bba65acb94a2b36ebd79a7a8a41f9258a7c3fe6e7143b2b7196482\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"bd7eb15a4e5c4d45ca19220fce5c4abf835a952a8c3a952d17bc9b4fb601bc5e\"" Jul 10 00:46:39.753320 env[1213]: time="2025-07-10T00:46:39.753290578Z" level=info msg="StartContainer for \"bd7eb15a4e5c4d45ca19220fce5c4abf835a952a8c3a952d17bc9b4fb601bc5e\"" Jul 10 00:46:39.768051 systemd[1]: Started cri-containerd-bd7eb15a4e5c4d45ca19220fce5c4abf835a952a8c3a952d17bc9b4fb601bc5e.scope. Jul 10 00:46:39.806000 audit[2028]: AVC avc: denied { perfmon } for pid=2028 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:39.808125 kernel: kauditd_printk_skb: 298 callbacks suppressed Jul 10 00:46:39.808195 kernel: audit: type=1400 audit(1752108399.806:537): avc: denied { perfmon } for pid=2028 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:39.806000 audit[2028]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=1529 pid=2028 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:46:39.813800 kernel: audit: type=1300 audit(1752108399.806:537): arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=1529 pid=2028 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:46:39.813855 kernel: audit: type=1327 audit(1752108399.806:537): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6264376562313561346535633464343563613139323230666365356334 Jul 10 00:46:39.806000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6264376562313561346535633464343563613139323230666365356334 Jul 10 00:46:39.817012 kernel: audit: type=1400 audit(1752108399.806:538): avc: denied { bpf } for pid=2028 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:39.806000 audit[2028]: AVC avc: denied { bpf } for pid=2028 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:39.806000 audit[2028]: AVC avc: denied { bpf } for pid=2028 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:39.821964 kernel: audit: type=1400 audit(1752108399.806:538): avc: denied { bpf } for pid=2028 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:39.822025 kernel: audit: type=1400 audit(1752108399.806:538): avc: denied { bpf } for pid=2028 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:39.806000 audit[2028]: AVC avc: denied { bpf } for pid=2028 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:39.806000 audit[2028]: AVC avc: denied { perfmon } for pid=2028 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:39.826420 kernel: audit: type=1400 audit(1752108399.806:538): avc: denied { perfmon } for pid=2028 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:39.826470 kernel: audit: type=1400 audit(1752108399.806:538): avc: denied { perfmon } for pid=2028 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:39.806000 audit[2028]: AVC avc: denied { perfmon } for pid=2028 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:39.806000 audit[2028]: AVC avc: denied { perfmon } for pid=2028 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:39.831085 kernel: audit: type=1400 audit(1752108399.806:538): avc: denied { perfmon } for pid=2028 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:39.806000 audit[2028]: AVC avc: denied { perfmon } for pid=2028 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:39.834006 kernel: audit: type=1400 audit(1752108399.806:538): avc: denied { perfmon } for pid=2028 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:39.806000 audit[2028]: AVC avc: denied { perfmon } for pid=2028 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:39.806000 audit[2028]: AVC avc: denied { bpf } for pid=2028 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:39.806000 audit[2028]: AVC avc: denied { bpf } for pid=2028 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:39.806000 audit: BPF prog-id=75 op=LOAD Jul 10 00:46:39.806000 audit[2028]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=1529 pid=2028 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:46:39.806000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6264376562313561346535633464343563613139323230666365356334 Jul 10 00:46:39.807000 audit[2028]: AVC avc: denied { bpf } for pid=2028 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:39.807000 audit[2028]: AVC avc: denied { bpf } for pid=2028 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:39.807000 audit[2028]: AVC avc: denied { perfmon } for pid=2028 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:39.807000 audit[2028]: AVC avc: denied { perfmon } for pid=2028 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:39.807000 audit[2028]: AVC avc: denied { perfmon } for pid=2028 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:39.807000 audit[2028]: AVC avc: denied { perfmon } for pid=2028 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:39.807000 audit[2028]: AVC avc: denied { perfmon } for pid=2028 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:39.807000 audit[2028]: AVC avc: denied { bpf } for pid=2028 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:39.807000 audit[2028]: AVC avc: denied { bpf } for pid=2028 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:39.807000 audit: BPF prog-id=76 op=LOAD Jul 10 00:46:39.807000 audit[2028]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=1529 pid=2028 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:46:39.807000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6264376562313561346535633464343563613139323230666365356334 Jul 10 00:46:39.809000 audit: BPF prog-id=76 op=UNLOAD Jul 10 00:46:39.809000 audit: BPF prog-id=75 op=UNLOAD Jul 10 00:46:39.809000 audit[2028]: AVC avc: denied { bpf } for pid=2028 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:39.809000 audit[2028]: AVC avc: denied { bpf } for pid=2028 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:39.809000 audit[2028]: AVC avc: denied { bpf } for pid=2028 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:39.809000 audit[2028]: AVC avc: denied { perfmon } for pid=2028 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:39.809000 audit[2028]: AVC avc: denied { perfmon } for pid=2028 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:39.809000 audit[2028]: AVC avc: denied { perfmon } for pid=2028 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:39.809000 audit[2028]: AVC avc: denied { perfmon } for pid=2028 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:39.809000 audit[2028]: AVC avc: denied { perfmon } for pid=2028 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:39.809000 audit[2028]: AVC avc: denied { bpf } for pid=2028 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:39.809000 audit[2028]: AVC avc: denied { bpf } for pid=2028 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:39.809000 audit: BPF prog-id=77 op=LOAD Jul 10 00:46:39.809000 audit[2028]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=1529 pid=2028 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:46:39.809000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6264376562313561346535633464343563613139323230666365356334 Jul 10 00:46:39.843188 env[1213]: time="2025-07-10T00:46:39.843141267Z" level=info msg="StartContainer for \"bd7eb15a4e5c4d45ca19220fce5c4abf835a952a8c3a952d17bc9b4fb601bc5e\" returns successfully" Jul 10 00:46:40.011777 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Jul 10 00:46:40.011941 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. Jul 10 00:46:40.078335 kubelet[1452]: E0710 00:46:40.078268 1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 00:46:40.288519 kubelet[1452]: I0710 00:46:40.288242 1452 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="0ee534bb64d3850032788c287ce53841e20507b5b250d188dcd872c2645c9472" Jul 10 00:46:40.288989 env[1213]: time="2025-07-10T00:46:40.288943273Z" level=info msg="StopPodSandbox for \"0ee534bb64d3850032788c287ce53841e20507b5b250d188dcd872c2645c9472\"" Jul 10 00:46:40.349979 kubelet[1452]: I0710 00:46:40.349902 1452 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-node-xxrn8" podStartSLOduration=2.786066426 podStartE2EDuration="13.349881959s" podCreationTimestamp="2025-07-10 00:46:27 +0000 UTC" firstStartedPulling="2025-07-10 00:46:29.171898767 +0000 UTC m=+2.867003764" lastFinishedPulling="2025-07-10 00:46:39.73571426 +0000 UTC m=+13.430819297" observedRunningTime="2025-07-10 00:46:40.303918394 +0000 UTC m=+13.999023430" watchObservedRunningTime="2025-07-10 00:46:40.349881959 +0000 UTC m=+14.044986996" Jul 10 00:46:40.431514 env[1213]: 2025-07-10 00:46:40.351 [INFO][2101] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="0ee534bb64d3850032788c287ce53841e20507b5b250d188dcd872c2645c9472" Jul 10 00:46:40.431514 env[1213]: 2025-07-10 00:46:40.352 [INFO][2101] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="0ee534bb64d3850032788c287ce53841e20507b5b250d188dcd872c2645c9472" iface="eth0" netns="/var/run/netns/cni-47065c1a-ca95-95c3-1745-fb81a799617a" Jul 10 00:46:40.431514 env[1213]: 2025-07-10 00:46:40.352 [INFO][2101] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="0ee534bb64d3850032788c287ce53841e20507b5b250d188dcd872c2645c9472" iface="eth0" netns="/var/run/netns/cni-47065c1a-ca95-95c3-1745-fb81a799617a" Jul 10 00:46:40.431514 env[1213]: 2025-07-10 00:46:40.352 [INFO][2101] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="0ee534bb64d3850032788c287ce53841e20507b5b250d188dcd872c2645c9472" iface="eth0" netns="/var/run/netns/cni-47065c1a-ca95-95c3-1745-fb81a799617a" Jul 10 00:46:40.431514 env[1213]: 2025-07-10 00:46:40.352 [INFO][2101] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="0ee534bb64d3850032788c287ce53841e20507b5b250d188dcd872c2645c9472" Jul 10 00:46:40.431514 env[1213]: 2025-07-10 00:46:40.352 [INFO][2101] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="0ee534bb64d3850032788c287ce53841e20507b5b250d188dcd872c2645c9472" Jul 10 00:46:40.431514 env[1213]: 2025-07-10 00:46:40.415 [INFO][2126] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="0ee534bb64d3850032788c287ce53841e20507b5b250d188dcd872c2645c9472" HandleID="k8s-pod-network.0ee534bb64d3850032788c287ce53841e20507b5b250d188dcd872c2645c9472" Workload="10.0.0.135-k8s-nginx--deployment--7fcdb87857--pl76q-eth0" Jul 10 00:46:40.431514 env[1213]: 2025-07-10 00:46:40.415 [INFO][2126] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Jul 10 00:46:40.431514 env[1213]: 2025-07-10 00:46:40.415 [INFO][2126] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Jul 10 00:46:40.431514 env[1213]: 2025-07-10 00:46:40.426 [WARNING][2126] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="0ee534bb64d3850032788c287ce53841e20507b5b250d188dcd872c2645c9472" HandleID="k8s-pod-network.0ee534bb64d3850032788c287ce53841e20507b5b250d188dcd872c2645c9472" Workload="10.0.0.135-k8s-nginx--deployment--7fcdb87857--pl76q-eth0" Jul 10 00:46:40.431514 env[1213]: 2025-07-10 00:46:40.426 [INFO][2126] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="0ee534bb64d3850032788c287ce53841e20507b5b250d188dcd872c2645c9472" HandleID="k8s-pod-network.0ee534bb64d3850032788c287ce53841e20507b5b250d188dcd872c2645c9472" Workload="10.0.0.135-k8s-nginx--deployment--7fcdb87857--pl76q-eth0" Jul 10 00:46:40.431514 env[1213]: 2025-07-10 00:46:40.428 [INFO][2126] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Jul 10 00:46:40.431514 env[1213]: 2025-07-10 00:46:40.430 [INFO][2101] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="0ee534bb64d3850032788c287ce53841e20507b5b250d188dcd872c2645c9472" Jul 10 00:46:40.432168 env[1213]: time="2025-07-10T00:46:40.431763562Z" level=info msg="TearDown network for sandbox \"0ee534bb64d3850032788c287ce53841e20507b5b250d188dcd872c2645c9472\" successfully" Jul 10 00:46:40.432168 env[1213]: time="2025-07-10T00:46:40.431797736Z" level=info msg="StopPodSandbox for \"0ee534bb64d3850032788c287ce53841e20507b5b250d188dcd872c2645c9472\" returns successfully" Jul 10 00:46:40.433146 systemd[1]: run-netns-cni\x2d47065c1a\x2dca95\x2d95c3\x2d1745\x2dfb81a799617a.mount: Deactivated successfully. Jul 10 00:46:40.433994 env[1213]: time="2025-07-10T00:46:40.433952340Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-7fcdb87857-pl76q,Uid:fdc3a8e0-bfc3-4e7f-b4f3-888e75fa02b2,Namespace:default,Attempt:1,}" Jul 10 00:46:40.554373 systemd-networkd[1043]: cali2ae3e1a7830: Link UP Jul 10 00:46:40.557072 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Jul 10 00:46:40.557175 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali2ae3e1a7830: link becomes ready Jul 10 00:46:40.557124 systemd-networkd[1043]: cali2ae3e1a7830: Gained carrier Jul 10 00:46:40.565570 env[1213]: 2025-07-10 00:46:40.469 [INFO][2134] cni-plugin/utils.go 100: File /var/lib/calico/mtu does not exist Jul 10 00:46:40.565570 env[1213]: 2025-07-10 00:46:40.483 [INFO][2134] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.0.0.135-k8s-nginx--deployment--7fcdb87857--pl76q-eth0 nginx-deployment-7fcdb87857- default fdc3a8e0-bfc3-4e7f-b4f3-888e75fa02b2 1226 0 2025-07-10 00:46:38 +0000 UTC map[app:nginx pod-template-hash:7fcdb87857 projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 10.0.0.135 nginx-deployment-7fcdb87857-pl76q eth0 default [] [] [kns.default ksa.default.default] cali2ae3e1a7830 [] [] }} ContainerID="82286403d2eabbfce98e3304bac6b8db6c95586e044c086c5ac1e3f7745583fc" Namespace="default" Pod="nginx-deployment-7fcdb87857-pl76q" WorkloadEndpoint="10.0.0.135-k8s-nginx--deployment--7fcdb87857--pl76q-" Jul 10 00:46:40.565570 env[1213]: 2025-07-10 00:46:40.483 [INFO][2134] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="82286403d2eabbfce98e3304bac6b8db6c95586e044c086c5ac1e3f7745583fc" Namespace="default" Pod="nginx-deployment-7fcdb87857-pl76q" WorkloadEndpoint="10.0.0.135-k8s-nginx--deployment--7fcdb87857--pl76q-eth0" Jul 10 00:46:40.565570 env[1213]: 2025-07-10 00:46:40.506 [INFO][2148] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="82286403d2eabbfce98e3304bac6b8db6c95586e044c086c5ac1e3f7745583fc" HandleID="k8s-pod-network.82286403d2eabbfce98e3304bac6b8db6c95586e044c086c5ac1e3f7745583fc" Workload="10.0.0.135-k8s-nginx--deployment--7fcdb87857--pl76q-eth0" Jul 10 00:46:40.565570 env[1213]: 2025-07-10 00:46:40.506 [INFO][2148] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="82286403d2eabbfce98e3304bac6b8db6c95586e044c086c5ac1e3f7745583fc" HandleID="k8s-pod-network.82286403d2eabbfce98e3304bac6b8db6c95586e044c086c5ac1e3f7745583fc" Workload="10.0.0.135-k8s-nginx--deployment--7fcdb87857--pl76q-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x40002dd630), Attrs:map[string]string{"namespace":"default", "node":"10.0.0.135", "pod":"nginx-deployment-7fcdb87857-pl76q", "timestamp":"2025-07-10 00:46:40.506438032 +0000 UTC"}, Hostname:"10.0.0.135", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Jul 10 00:46:40.565570 env[1213]: 2025-07-10 00:46:40.506 [INFO][2148] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Jul 10 00:46:40.565570 env[1213]: 2025-07-10 00:46:40.507 [INFO][2148] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Jul 10 00:46:40.565570 env[1213]: 2025-07-10 00:46:40.507 [INFO][2148] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.0.0.135' Jul 10 00:46:40.565570 env[1213]: 2025-07-10 00:46:40.517 [INFO][2148] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.82286403d2eabbfce98e3304bac6b8db6c95586e044c086c5ac1e3f7745583fc" host="10.0.0.135" Jul 10 00:46:40.565570 env[1213]: 2025-07-10 00:46:40.523 [INFO][2148] ipam/ipam.go 394: Looking up existing affinities for host host="10.0.0.135" Jul 10 00:46:40.565570 env[1213]: 2025-07-10 00:46:40.529 [INFO][2148] ipam/ipam.go 511: Trying affinity for 192.168.36.128/26 host="10.0.0.135" Jul 10 00:46:40.565570 env[1213]: 2025-07-10 00:46:40.531 [INFO][2148] ipam/ipam.go 158: Attempting to load block cidr=192.168.36.128/26 host="10.0.0.135" Jul 10 00:46:40.565570 env[1213]: 2025-07-10 00:46:40.534 [INFO][2148] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.36.128/26 host="10.0.0.135" Jul 10 00:46:40.565570 env[1213]: 2025-07-10 00:46:40.534 [INFO][2148] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.36.128/26 handle="k8s-pod-network.82286403d2eabbfce98e3304bac6b8db6c95586e044c086c5ac1e3f7745583fc" host="10.0.0.135" Jul 10 00:46:40.565570 env[1213]: 2025-07-10 00:46:40.536 [INFO][2148] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.82286403d2eabbfce98e3304bac6b8db6c95586e044c086c5ac1e3f7745583fc Jul 10 00:46:40.565570 env[1213]: 2025-07-10 00:46:40.540 [INFO][2148] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.36.128/26 handle="k8s-pod-network.82286403d2eabbfce98e3304bac6b8db6c95586e044c086c5ac1e3f7745583fc" host="10.0.0.135" Jul 10 00:46:40.565570 env[1213]: 2025-07-10 00:46:40.546 [INFO][2148] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.36.129/26] block=192.168.36.128/26 handle="k8s-pod-network.82286403d2eabbfce98e3304bac6b8db6c95586e044c086c5ac1e3f7745583fc" host="10.0.0.135" Jul 10 00:46:40.565570 env[1213]: 2025-07-10 00:46:40.546 [INFO][2148] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.36.129/26] handle="k8s-pod-network.82286403d2eabbfce98e3304bac6b8db6c95586e044c086c5ac1e3f7745583fc" host="10.0.0.135" Jul 10 00:46:40.565570 env[1213]: 2025-07-10 00:46:40.546 [INFO][2148] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Jul 10 00:46:40.565570 env[1213]: 2025-07-10 00:46:40.546 [INFO][2148] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.36.129/26] IPv6=[] ContainerID="82286403d2eabbfce98e3304bac6b8db6c95586e044c086c5ac1e3f7745583fc" HandleID="k8s-pod-network.82286403d2eabbfce98e3304bac6b8db6c95586e044c086c5ac1e3f7745583fc" Workload="10.0.0.135-k8s-nginx--deployment--7fcdb87857--pl76q-eth0" Jul 10 00:46:40.566177 env[1213]: 2025-07-10 00:46:40.548 [INFO][2134] cni-plugin/k8s.go 418: Populated endpoint ContainerID="82286403d2eabbfce98e3304bac6b8db6c95586e044c086c5ac1e3f7745583fc" Namespace="default" Pod="nginx-deployment-7fcdb87857-pl76q" WorkloadEndpoint="10.0.0.135-k8s-nginx--deployment--7fcdb87857--pl76q-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.135-k8s-nginx--deployment--7fcdb87857--pl76q-eth0", GenerateName:"nginx-deployment-7fcdb87857-", Namespace:"default", SelfLink:"", UID:"fdc3a8e0-bfc3-4e7f-b4f3-888e75fa02b2", ResourceVersion:"1226", Generation:0, CreationTimestamp:time.Date(2025, time.July, 10, 0, 46, 38, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"7fcdb87857", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.135", ContainerID:"", Pod:"nginx-deployment-7fcdb87857-pl76q", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.36.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali2ae3e1a7830", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Jul 10 00:46:40.566177 env[1213]: 2025-07-10 00:46:40.548 [INFO][2134] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.36.129/32] ContainerID="82286403d2eabbfce98e3304bac6b8db6c95586e044c086c5ac1e3f7745583fc" Namespace="default" Pod="nginx-deployment-7fcdb87857-pl76q" WorkloadEndpoint="10.0.0.135-k8s-nginx--deployment--7fcdb87857--pl76q-eth0" Jul 10 00:46:40.566177 env[1213]: 2025-07-10 00:46:40.548 [INFO][2134] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali2ae3e1a7830 ContainerID="82286403d2eabbfce98e3304bac6b8db6c95586e044c086c5ac1e3f7745583fc" Namespace="default" Pod="nginx-deployment-7fcdb87857-pl76q" WorkloadEndpoint="10.0.0.135-k8s-nginx--deployment--7fcdb87857--pl76q-eth0" Jul 10 00:46:40.566177 env[1213]: 2025-07-10 00:46:40.557 [INFO][2134] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="82286403d2eabbfce98e3304bac6b8db6c95586e044c086c5ac1e3f7745583fc" Namespace="default" Pod="nginx-deployment-7fcdb87857-pl76q" WorkloadEndpoint="10.0.0.135-k8s-nginx--deployment--7fcdb87857--pl76q-eth0" Jul 10 00:46:40.566177 env[1213]: 2025-07-10 00:46:40.557 [INFO][2134] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="82286403d2eabbfce98e3304bac6b8db6c95586e044c086c5ac1e3f7745583fc" Namespace="default" Pod="nginx-deployment-7fcdb87857-pl76q" WorkloadEndpoint="10.0.0.135-k8s-nginx--deployment--7fcdb87857--pl76q-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.135-k8s-nginx--deployment--7fcdb87857--pl76q-eth0", GenerateName:"nginx-deployment-7fcdb87857-", Namespace:"default", SelfLink:"", UID:"fdc3a8e0-bfc3-4e7f-b4f3-888e75fa02b2", ResourceVersion:"1226", Generation:0, CreationTimestamp:time.Date(2025, time.July, 10, 0, 46, 38, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"7fcdb87857", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.135", ContainerID:"82286403d2eabbfce98e3304bac6b8db6c95586e044c086c5ac1e3f7745583fc", Pod:"nginx-deployment-7fcdb87857-pl76q", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.36.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali2ae3e1a7830", MAC:"fe:5e:d6:1d:fb:ad", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Jul 10 00:46:40.566177 env[1213]: 2025-07-10 00:46:40.564 [INFO][2134] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="82286403d2eabbfce98e3304bac6b8db6c95586e044c086c5ac1e3f7745583fc" Namespace="default" Pod="nginx-deployment-7fcdb87857-pl76q" WorkloadEndpoint="10.0.0.135-k8s-nginx--deployment--7fcdb87857--pl76q-eth0" Jul 10 00:46:40.574908 env[1213]: time="2025-07-10T00:46:40.574834510Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 10 00:46:40.574908 env[1213]: time="2025-07-10T00:46:40.574875742Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 10 00:46:40.574908 env[1213]: time="2025-07-10T00:46:40.574886189Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 10 00:46:40.575168 env[1213]: time="2025-07-10T00:46:40.575144783Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/82286403d2eabbfce98e3304bac6b8db6c95586e044c086c5ac1e3f7745583fc pid=2172 runtime=io.containerd.runc.v2 Jul 10 00:46:40.585650 systemd[1]: Started cri-containerd-82286403d2eabbfce98e3304bac6b8db6c95586e044c086c5ac1e3f7745583fc.scope. Jul 10 00:46:40.603000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:40.603000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:40.603000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:40.603000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:40.603000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:40.603000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:40.603000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:40.603000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:40.603000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:40.604000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:40.604000 audit: BPF prog-id=78 op=LOAD Jul 10 00:46:40.604000 audit[2182]: AVC avc: denied { bpf } for pid=2182 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:40.604000 audit[2182]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=2172 pid=2182 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:46:40.604000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3832323836343033643265616262666365393865333330346261633662 Jul 10 00:46:40.605000 audit[2182]: AVC avc: denied { perfmon } for pid=2182 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:40.605000 audit[2182]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2172 pid=2182 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:46:40.605000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3832323836343033643265616262666365393865333330346261633662 Jul 10 00:46:40.605000 audit[2182]: AVC avc: denied { bpf } for pid=2182 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:40.605000 audit[2182]: AVC avc: denied { bpf } for pid=2182 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:40.605000 audit[2182]: AVC avc: denied { bpf } for pid=2182 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:40.605000 audit[2182]: AVC avc: denied { perfmon } for pid=2182 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:40.605000 audit[2182]: AVC avc: denied { perfmon } for pid=2182 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:40.605000 audit[2182]: AVC avc: denied { perfmon } for pid=2182 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:40.605000 audit[2182]: AVC avc: denied { perfmon } for pid=2182 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:40.605000 audit[2182]: AVC avc: denied { perfmon } for pid=2182 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:40.605000 audit[2182]: AVC avc: denied { bpf } for pid=2182 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:40.605000 audit[2182]: AVC avc: denied { bpf } for pid=2182 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:40.605000 audit: BPF prog-id=79 op=LOAD Jul 10 00:46:40.605000 audit[2182]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2172 pid=2182 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:46:40.605000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3832323836343033643265616262666365393865333330346261633662 Jul 10 00:46:40.606000 audit[2182]: AVC avc: denied { bpf } for pid=2182 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:40.606000 audit[2182]: AVC avc: denied { bpf } for pid=2182 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:40.606000 audit[2182]: AVC avc: denied { perfmon } for pid=2182 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:40.606000 audit[2182]: AVC avc: denied { perfmon } for pid=2182 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:40.606000 audit[2182]: AVC avc: denied { perfmon } for pid=2182 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:40.606000 audit[2182]: AVC avc: denied { perfmon } for pid=2182 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:40.606000 audit[2182]: AVC avc: denied { perfmon } for pid=2182 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:40.606000 audit[2182]: AVC avc: denied { bpf } for pid=2182 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:40.606000 audit[2182]: AVC avc: denied { bpf } for pid=2182 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:40.606000 audit: BPF prog-id=80 op=LOAD Jul 10 00:46:40.606000 audit[2182]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2172 pid=2182 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:46:40.606000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3832323836343033643265616262666365393865333330346261633662 Jul 10 00:46:40.606000 audit: BPF prog-id=80 op=UNLOAD Jul 10 00:46:40.606000 audit: BPF prog-id=79 op=UNLOAD Jul 10 00:46:40.606000 audit[2182]: AVC avc: denied { bpf } for pid=2182 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:40.606000 audit[2182]: AVC avc: denied { bpf } for pid=2182 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:40.606000 audit[2182]: AVC avc: denied { bpf } for pid=2182 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:40.606000 audit[2182]: AVC avc: denied { perfmon } for pid=2182 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:40.606000 audit[2182]: AVC avc: denied { perfmon } for pid=2182 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:40.606000 audit[2182]: AVC avc: denied { perfmon } for pid=2182 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:40.606000 audit[2182]: AVC avc: denied { perfmon } for pid=2182 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:40.606000 audit[2182]: AVC avc: denied { perfmon } for pid=2182 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:40.606000 audit[2182]: AVC avc: denied { bpf } for pid=2182 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:40.606000 audit[2182]: AVC avc: denied { bpf } for pid=2182 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:40.606000 audit: BPF prog-id=81 op=LOAD Jul 10 00:46:40.606000 audit[2182]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2172 pid=2182 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:46:40.606000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3832323836343033643265616262666365393865333330346261633662 Jul 10 00:46:40.609457 systemd-resolved[1154]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Jul 10 00:46:40.624625 env[1213]: time="2025-07-10T00:46:40.624489050Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-7fcdb87857-pl76q,Uid:fdc3a8e0-bfc3-4e7f-b4f3-888e75fa02b2,Namespace:default,Attempt:1,} returns sandbox id \"82286403d2eabbfce98e3304bac6b8db6c95586e044c086c5ac1e3f7745583fc\"" Jul 10 00:46:40.625703 env[1213]: time="2025-07-10T00:46:40.625667936Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" Jul 10 00:46:41.079320 kubelet[1452]: E0710 00:46:41.079259 1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 00:46:41.272000 audit[2247]: AVC avc: denied { write } for pid=2247 comm="tee" name="fd" dev="proc" ino=14207 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Jul 10 00:46:41.272000 audit[2247]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=fffffa3567e4 a2=241 a3=1b6 items=1 ppid=2213 pid=2247 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:46:41.272000 audit: CWD cwd="/etc/service/enabled/felix/log" Jul 10 00:46:41.272000 audit: PATH item=0 name="/dev/fd/63" inode=14200 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:46:41.272000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Jul 10 00:46:41.282000 audit[2253]: AVC avc: denied { write } for pid=2253 comm="tee" name="fd" dev="proc" ino=14214 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Jul 10 00:46:41.282000 audit[2253]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffe0e5c7e4 a2=241 a3=1b6 items=1 ppid=2223 pid=2253 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:46:41.282000 audit: CWD cwd="/etc/service/enabled/bird6/log" Jul 10 00:46:41.282000 audit: PATH item=0 name="/dev/fd/63" inode=14767 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:46:41.282000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Jul 10 00:46:41.284000 audit[2261]: AVC avc: denied { write } for pid=2261 comm="tee" name="fd" dev="proc" ino=16458 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Jul 10 00:46:41.284000 audit[2261]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=fffff63db7d4 a2=241 a3=1b6 items=1 ppid=2216 pid=2261 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:46:41.284000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Jul 10 00:46:41.284000 audit: PATH item=0 name="/dev/fd/63" inode=15530 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:46:41.284000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Jul 10 00:46:41.292000 audit[2268]: AVC avc: denied { write } for pid=2268 comm="tee" name="fd" dev="proc" ino=14220 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Jul 10 00:46:41.292000 audit[2268]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=fffff024d7d5 a2=241 a3=1b6 items=1 ppid=2218 pid=2268 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:46:41.292000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Jul 10 00:46:41.292000 audit: PATH item=0 name="/dev/fd/63" inode=15531 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:46:41.292000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Jul 10 00:46:41.293000 audit[2257]: AVC avc: denied { write } for pid=2257 comm="tee" name="fd" dev="proc" ino=14778 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Jul 10 00:46:41.293000 audit[2257]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffde0b07e6 a2=241 a3=1b6 items=1 ppid=2217 pid=2257 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:46:41.293000 audit: CWD cwd="/etc/service/enabled/cni/log" Jul 10 00:46:41.293000 audit: PATH item=0 name="/dev/fd/63" inode=15525 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:46:41.293000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Jul 10 00:46:41.294000 audit[2275]: AVC avc: denied { write } for pid=2275 comm="tee" name="fd" dev="proc" ino=16464 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Jul 10 00:46:41.294000 audit[2275]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffcea5f7e5 a2=241 a3=1b6 items=1 ppid=2222 pid=2275 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:46:41.294000 audit: CWD cwd="/etc/service/enabled/bird/log" Jul 10 00:46:41.294000 audit: PATH item=0 name="/dev/fd/63" inode=14211 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:46:41.294000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Jul 10 00:46:41.298000 audit[2283]: AVC avc: denied { write } for pid=2283 comm="tee" name="fd" dev="proc" ino=16468 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Jul 10 00:46:41.298000 audit[2283]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=fffff2a737e4 a2=241 a3=1b6 items=1 ppid=2212 pid=2283 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:46:41.298000 audit: CWD cwd="/etc/service/enabled/confd/log" Jul 10 00:46:41.298000 audit: PATH item=0 name="/dev/fd/63" inode=16455 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:46:41.298000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Jul 10 00:46:41.306398 systemd[1]: run-containerd-runc-k8s.io-bd7eb15a4e5c4d45ca19220fce5c4abf835a952a8c3a952d17bc9b4fb601bc5e-runc.sssztE.mount: Deactivated successfully. Jul 10 00:46:41.494000 audit[2355]: AVC avc: denied { bpf } for pid=2355 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:41.494000 audit[2355]: AVC avc: denied { bpf } for pid=2355 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:41.494000 audit[2355]: AVC avc: denied { perfmon } for pid=2355 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:41.494000 audit[2355]: AVC avc: denied { perfmon } for pid=2355 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:41.494000 audit[2355]: AVC avc: denied { perfmon } for pid=2355 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:41.494000 audit[2355]: AVC avc: denied { perfmon } for pid=2355 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:41.494000 audit[2355]: AVC avc: denied { perfmon } for pid=2355 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:41.494000 audit[2355]: AVC avc: denied { bpf } for pid=2355 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:41.494000 audit[2355]: AVC avc: denied { bpf } for pid=2355 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:41.494000 audit: BPF prog-id=82 op=LOAD Jul 10 00:46:41.494000 audit[2355]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffd77e6258 a2=98 a3=ffffd77e6248 items=0 ppid=2215 pid=2355 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:46:41.494000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F74632F676C6F62616C732F63616C695F63746C625F70726F677300747970650070726F675F6172726179006B657900340076616C7565003400656E74726965730033006E616D650063616C695F63746C625F70726F677300666C6167730030 Jul 10 00:46:41.495000 audit: BPF prog-id=82 op=UNLOAD Jul 10 00:46:41.495000 audit[2355]: AVC avc: denied { bpf } for pid=2355 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:41.495000 audit[2355]: AVC avc: denied { bpf } for pid=2355 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:41.495000 audit[2355]: AVC avc: denied { perfmon } for pid=2355 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:41.495000 audit[2355]: AVC avc: denied { perfmon } for pid=2355 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:41.495000 audit[2355]: AVC avc: denied { perfmon } for pid=2355 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:41.495000 audit[2355]: AVC avc: denied { perfmon } for pid=2355 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:41.495000 audit[2355]: AVC avc: denied { perfmon } for pid=2355 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:41.495000 audit[2355]: AVC avc: denied { bpf } for pid=2355 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:41.495000 audit[2355]: AVC avc: denied { bpf } for pid=2355 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:41.495000 audit: BPF prog-id=83 op=LOAD Jul 10 00:46:41.495000 audit[2355]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffd77e6108 a2=74 a3=95 items=0 ppid=2215 pid=2355 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:46:41.495000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F74632F676C6F62616C732F63616C695F63746C625F70726F677300747970650070726F675F6172726179006B657900340076616C7565003400656E74726965730033006E616D650063616C695F63746C625F70726F677300666C6167730030 Jul 10 00:46:41.495000 audit: BPF prog-id=83 op=UNLOAD Jul 10 00:46:41.495000 audit[2355]: AVC avc: denied { bpf } for pid=2355 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:41.495000 audit[2355]: AVC avc: denied { bpf } for pid=2355 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:41.495000 audit[2355]: AVC avc: denied { perfmon } for pid=2355 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:41.495000 audit[2355]: AVC avc: denied { perfmon } for pid=2355 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:41.495000 audit[2355]: AVC avc: denied { perfmon } for pid=2355 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:41.495000 audit[2355]: AVC avc: denied { perfmon } for pid=2355 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:41.495000 audit[2355]: AVC avc: denied { perfmon } for pid=2355 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:41.495000 audit[2355]: AVC avc: denied { bpf } for pid=2355 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:41.495000 audit[2355]: AVC avc: denied { bpf } for pid=2355 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:41.495000 audit: BPF prog-id=84 op=LOAD Jul 10 00:46:41.495000 audit[2355]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffd77e6138 a2=40 a3=ffffd77e6168 items=0 ppid=2215 pid=2355 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:46:41.495000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F74632F676C6F62616C732F63616C695F63746C625F70726F677300747970650070726F675F6172726179006B657900340076616C7565003400656E74726965730033006E616D650063616C695F63746C625F70726F677300666C6167730030 Jul 10 00:46:41.495000 audit: BPF prog-id=84 op=UNLOAD Jul 10 00:46:41.495000 audit[2355]: AVC avc: denied { perfmon } for pid=2355 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:41.495000 audit[2355]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=0 a1=ffffd77e6250 a2=50 a3=0 items=0 ppid=2215 pid=2355 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:46:41.495000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F74632F676C6F62616C732F63616C695F63746C625F70726F677300747970650070726F675F6172726179006B657900340076616C7565003400656E74726965730033006E616D650063616C695F63746C625F70726F677300666C6167730030 Jul 10 00:46:41.496000 audit[2356]: AVC avc: denied { bpf } for pid=2356 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:41.496000 audit[2356]: AVC avc: denied { bpf } for pid=2356 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:41.496000 audit[2356]: AVC avc: denied { perfmon } for pid=2356 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:41.496000 audit[2356]: AVC avc: denied { perfmon } for pid=2356 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:41.496000 audit[2356]: AVC avc: denied { perfmon } for pid=2356 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:41.496000 audit[2356]: AVC avc: denied { perfmon } for pid=2356 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:41.496000 audit[2356]: AVC avc: denied { perfmon } for pid=2356 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:41.496000 audit[2356]: AVC avc: denied { bpf } for pid=2356 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:41.496000 audit[2356]: AVC avc: denied { bpf } for pid=2356 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:41.496000 audit: BPF prog-id=85 op=LOAD Jul 10 00:46:41.496000 audit[2356]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffe2143c78 a2=98 a3=ffffe2143c68 items=0 ppid=2215 pid=2356 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:46:41.496000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Jul 10 00:46:41.496000 audit: BPF prog-id=85 op=UNLOAD Jul 10 00:46:41.496000 audit[2356]: AVC avc: denied { bpf } for pid=2356 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:41.496000 audit[2356]: AVC avc: denied { bpf } for pid=2356 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:41.496000 audit[2356]: AVC avc: denied { perfmon } for pid=2356 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:41.496000 audit[2356]: AVC avc: denied { perfmon } for pid=2356 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:41.496000 audit[2356]: AVC avc: denied { perfmon } for pid=2356 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:41.496000 audit[2356]: AVC avc: denied { perfmon } for pid=2356 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:41.496000 audit[2356]: AVC avc: denied { perfmon } for pid=2356 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:41.496000 audit[2356]: AVC avc: denied { bpf } for pid=2356 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:41.496000 audit[2356]: AVC avc: denied { bpf } for pid=2356 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:41.496000 audit: BPF prog-id=86 op=LOAD Jul 10 00:46:41.496000 audit[2356]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=ffffe2143908 a2=74 a3=95 items=0 ppid=2215 pid=2356 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:46:41.496000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Jul 10 00:46:41.496000 audit: BPF prog-id=86 op=UNLOAD Jul 10 00:46:41.496000 audit[2356]: AVC avc: denied { bpf } for pid=2356 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:41.496000 audit[2356]: AVC avc: denied { bpf } for pid=2356 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:41.496000 audit[2356]: AVC avc: denied { perfmon } for pid=2356 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:41.496000 audit[2356]: AVC avc: denied { perfmon } for pid=2356 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:41.496000 audit[2356]: AVC avc: denied { perfmon } for pid=2356 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:41.496000 audit[2356]: AVC avc: denied { perfmon } for pid=2356 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:41.496000 audit[2356]: AVC avc: denied { perfmon } for pid=2356 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:41.496000 audit[2356]: AVC avc: denied { bpf } for pid=2356 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:41.496000 audit[2356]: AVC avc: denied { bpf } for pid=2356 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:41.496000 audit: BPF prog-id=87 op=LOAD Jul 10 00:46:41.496000 audit[2356]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=ffffe2143968 a2=94 a3=2 items=0 ppid=2215 pid=2356 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:46:41.496000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Jul 10 00:46:41.496000 audit: BPF prog-id=87 op=UNLOAD Jul 10 00:46:41.652000 audit[2356]: AVC avc: denied { bpf } for pid=2356 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:41.652000 audit[2356]: AVC avc: denied { bpf } for pid=2356 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:41.652000 audit[2356]: AVC avc: denied { perfmon } for pid=2356 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:41.652000 audit[2356]: AVC avc: denied { perfmon } for pid=2356 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:41.652000 audit[2356]: AVC avc: denied { perfmon } for pid=2356 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:41.652000 audit[2356]: AVC avc: denied { perfmon } for pid=2356 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:41.652000 audit[2356]: AVC avc: denied { perfmon } for pid=2356 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:41.652000 audit[2356]: AVC avc: denied { bpf } for pid=2356 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:41.652000 audit[2356]: AVC avc: denied { bpf } for pid=2356 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:41.652000 audit: BPF prog-id=88 op=LOAD Jul 10 00:46:41.652000 audit[2356]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=ffffe2143928 a2=40 a3=ffffe2143958 items=0 ppid=2215 pid=2356 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:46:41.652000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Jul 10 00:46:41.652000 audit: BPF prog-id=88 op=UNLOAD Jul 10 00:46:41.652000 audit[2356]: AVC avc: denied { perfmon } for pid=2356 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:41.652000 audit[2356]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=0 a1=ffffe2143a40 a2=50 a3=0 items=0 ppid=2215 pid=2356 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:46:41.652000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Jul 10 00:46:41.663000 audit[2356]: AVC avc: denied { bpf } for pid=2356 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:41.663000 audit[2356]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffe2143998 a2=28 a3=ffffe2143ac8 items=0 ppid=2215 pid=2356 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:46:41.663000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Jul 10 00:46:41.663000 audit[2356]: AVC avc: denied { bpf } for pid=2356 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:41.663000 audit[2356]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffe21439c8 a2=28 a3=ffffe2143af8 items=0 ppid=2215 pid=2356 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:46:41.663000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Jul 10 00:46:41.663000 audit[2356]: AVC avc: denied { bpf } for pid=2356 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:41.663000 audit[2356]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffe2143878 a2=28 a3=ffffe21439a8 items=0 ppid=2215 pid=2356 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:46:41.663000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Jul 10 00:46:41.663000 audit[2356]: AVC avc: denied { bpf } for pid=2356 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:41.663000 audit[2356]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffe21439e8 a2=28 a3=ffffe2143b18 items=0 ppid=2215 pid=2356 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:46:41.663000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Jul 10 00:46:41.663000 audit[2356]: AVC avc: denied { bpf } for pid=2356 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:41.663000 audit[2356]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffe21439c8 a2=28 a3=ffffe2143af8 items=0 ppid=2215 pid=2356 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:46:41.663000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Jul 10 00:46:41.663000 audit[2356]: AVC avc: denied { bpf } for pid=2356 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:41.663000 audit[2356]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffe21439b8 a2=28 a3=ffffe2143ae8 items=0 ppid=2215 pid=2356 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:46:41.663000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Jul 10 00:46:41.664000 audit[2356]: AVC avc: denied { bpf } for pid=2356 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:41.664000 audit[2356]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffe21439e8 a2=28 a3=ffffe2143b18 items=0 ppid=2215 pid=2356 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:46:41.664000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Jul 10 00:46:41.664000 audit[2356]: AVC avc: denied { bpf } for pid=2356 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:41.664000 audit[2356]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffe21439c8 a2=28 a3=ffffe2143af8 items=0 ppid=2215 pid=2356 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:46:41.664000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Jul 10 00:46:41.664000 audit[2356]: AVC avc: denied { bpf } for pid=2356 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:41.664000 audit[2356]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffe21439e8 a2=28 a3=ffffe2143b18 items=0 ppid=2215 pid=2356 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:46:41.664000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Jul 10 00:46:41.664000 audit[2356]: AVC avc: denied { bpf } for pid=2356 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:41.664000 audit[2356]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffe21439b8 a2=28 a3=ffffe2143ae8 items=0 ppid=2215 pid=2356 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:46:41.664000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Jul 10 00:46:41.664000 audit[2356]: AVC avc: denied { bpf } for pid=2356 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:41.664000 audit[2356]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffe2143a38 a2=28 a3=ffffe2143b78 items=0 ppid=2215 pid=2356 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:46:41.664000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Jul 10 00:46:41.664000 audit[2356]: AVC avc: denied { perfmon } for pid=2356 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:41.664000 audit[2356]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=0 a1=ffffe2143770 a2=50 a3=0 items=0 ppid=2215 pid=2356 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:46:41.664000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Jul 10 00:46:41.664000 audit[2356]: AVC avc: denied { bpf } for pid=2356 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:41.664000 audit[2356]: AVC avc: denied { bpf } for pid=2356 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:41.664000 audit[2356]: AVC avc: denied { perfmon } for pid=2356 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:41.664000 audit[2356]: AVC avc: denied { perfmon } for pid=2356 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:41.664000 audit[2356]: AVC avc: denied { perfmon } for pid=2356 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:41.664000 audit[2356]: AVC avc: denied { perfmon } for pid=2356 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:41.664000 audit[2356]: AVC avc: denied { perfmon } for pid=2356 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:41.664000 audit[2356]: AVC avc: denied { bpf } for pid=2356 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:41.664000 audit[2356]: AVC avc: denied { bpf } for pid=2356 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:41.664000 audit: BPF prog-id=89 op=LOAD Jul 10 00:46:41.664000 audit[2356]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=ffffe2143778 a2=94 a3=5 items=0 ppid=2215 pid=2356 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:46:41.664000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Jul 10 00:46:41.664000 audit: BPF prog-id=89 op=UNLOAD Jul 10 00:46:41.664000 audit[2356]: AVC avc: denied { perfmon } for pid=2356 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:41.664000 audit[2356]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=0 a1=ffffe2143880 a2=50 a3=0 items=0 ppid=2215 pid=2356 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:46:41.664000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Jul 10 00:46:41.664000 audit[2356]: AVC avc: denied { bpf } for pid=2356 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:41.664000 audit[2356]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=16 a1=ffffe21439c8 a2=4 a3=3 items=0 ppid=2215 pid=2356 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:46:41.664000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Jul 10 00:46:41.664000 audit[2356]: AVC avc: denied { bpf } for pid=2356 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:41.664000 audit[2356]: AVC avc: denied { bpf } for pid=2356 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:41.664000 audit[2356]: AVC avc: denied { perfmon } for pid=2356 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:41.664000 audit[2356]: AVC avc: denied { bpf } for pid=2356 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:41.664000 audit[2356]: AVC avc: denied { perfmon } for pid=2356 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:41.664000 audit[2356]: AVC avc: denied { perfmon } for pid=2356 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:41.664000 audit[2356]: AVC avc: denied { perfmon } for pid=2356 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:41.664000 audit[2356]: AVC avc: denied { perfmon } for pid=2356 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:41.664000 audit[2356]: AVC avc: denied { perfmon } for pid=2356 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:41.664000 audit[2356]: AVC avc: denied { bpf } for pid=2356 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:41.664000 audit[2356]: AVC avc: denied { confidentiality } for pid=2356 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:46:41.664000 audit[2356]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=ffffe21439a8 a2=94 a3=6 items=0 ppid=2215 pid=2356 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:46:41.664000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Jul 10 00:46:41.664000 audit[2356]: AVC avc: denied { bpf } for pid=2356 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:41.664000 audit[2356]: AVC avc: denied { bpf } for pid=2356 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:41.664000 audit[2356]: AVC avc: denied { perfmon } for pid=2356 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:41.664000 audit[2356]: AVC avc: denied { bpf } for pid=2356 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:41.664000 audit[2356]: AVC avc: denied { perfmon } for pid=2356 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:41.664000 audit[2356]: AVC avc: denied { perfmon } for pid=2356 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:41.664000 audit[2356]: AVC avc: denied { perfmon } for pid=2356 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:41.664000 audit[2356]: AVC avc: denied { perfmon } for pid=2356 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:41.664000 audit[2356]: AVC avc: denied { perfmon } for pid=2356 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:41.664000 audit[2356]: AVC avc: denied { bpf } for pid=2356 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:41.664000 audit[2356]: AVC avc: denied { confidentiality } for pid=2356 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:46:41.664000 audit[2356]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=ffffe2143178 a2=94 a3=83 items=0 ppid=2215 pid=2356 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:46:41.664000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Jul 10 00:46:41.664000 audit[2356]: AVC avc: denied { bpf } for pid=2356 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:41.664000 audit[2356]: AVC avc: denied { bpf } for pid=2356 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:41.664000 audit[2356]: AVC avc: denied { perfmon } for pid=2356 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:41.664000 audit[2356]: AVC avc: denied { bpf } for pid=2356 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:41.664000 audit[2356]: AVC avc: denied { perfmon } for pid=2356 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:41.664000 audit[2356]: AVC avc: denied { perfmon } for pid=2356 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:41.664000 audit[2356]: AVC avc: denied { perfmon } for pid=2356 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:41.664000 audit[2356]: AVC avc: denied { perfmon } for pid=2356 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:41.664000 audit[2356]: AVC avc: denied { perfmon } for pid=2356 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:41.664000 audit[2356]: AVC avc: denied { bpf } for pid=2356 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:41.664000 audit[2356]: AVC avc: denied { confidentiality } for pid=2356 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:46:41.664000 audit[2356]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=ffffe2143178 a2=94 a3=83 items=0 ppid=2215 pid=2356 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:46:41.664000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Jul 10 00:46:41.675000 audit[2360]: AVC avc: denied { bpf } for pid=2360 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:41.675000 audit[2360]: AVC avc: denied { bpf } for pid=2360 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:41.675000 audit[2360]: AVC avc: denied { perfmon } for pid=2360 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:41.675000 audit[2360]: AVC avc: denied { perfmon } for pid=2360 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:41.675000 audit[2360]: AVC avc: denied { perfmon } for pid=2360 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:41.675000 audit[2360]: AVC avc: denied { perfmon } for pid=2360 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:41.675000 audit[2360]: AVC avc: denied { perfmon } for pid=2360 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:41.675000 audit[2360]: AVC avc: denied { bpf } for pid=2360 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:41.675000 audit[2360]: AVC avc: denied { bpf } for pid=2360 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:41.675000 audit: BPF prog-id=90 op=LOAD Jul 10 00:46:41.675000 audit[2360]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffd5dd5dc8 a2=98 a3=ffffd5dd5db8 items=0 ppid=2215 pid=2360 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:46:41.675000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Jul 10 00:46:41.675000 audit: BPF prog-id=90 op=UNLOAD Jul 10 00:46:41.675000 audit[2360]: AVC avc: denied { bpf } for pid=2360 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:41.675000 audit[2360]: AVC avc: denied { bpf } for pid=2360 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:41.675000 audit[2360]: AVC avc: denied { perfmon } for pid=2360 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:41.675000 audit[2360]: AVC avc: denied { perfmon } for pid=2360 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:41.675000 audit[2360]: AVC avc: denied { perfmon } for pid=2360 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:41.675000 audit[2360]: AVC avc: denied { perfmon } for pid=2360 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:41.675000 audit[2360]: AVC avc: denied { perfmon } for pid=2360 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:41.675000 audit[2360]: AVC avc: denied { bpf } for pid=2360 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:41.675000 audit[2360]: AVC avc: denied { bpf } for pid=2360 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:41.675000 audit: BPF prog-id=91 op=LOAD Jul 10 00:46:41.675000 audit[2360]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffd5dd5c78 a2=74 a3=95 items=0 ppid=2215 pid=2360 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:46:41.675000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Jul 10 00:46:41.675000 audit: BPF prog-id=91 op=UNLOAD Jul 10 00:46:41.675000 audit[2360]: AVC avc: denied { bpf } for pid=2360 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:41.675000 audit[2360]: AVC avc: denied { bpf } for pid=2360 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:41.675000 audit[2360]: AVC avc: denied { perfmon } for pid=2360 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:41.675000 audit[2360]: AVC avc: denied { perfmon } for pid=2360 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:41.675000 audit[2360]: AVC avc: denied { perfmon } for pid=2360 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:41.675000 audit[2360]: AVC avc: denied { perfmon } for pid=2360 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:41.675000 audit[2360]: AVC avc: denied { perfmon } for pid=2360 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:41.675000 audit[2360]: AVC avc: denied { bpf } for pid=2360 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:41.675000 audit[2360]: AVC avc: denied { bpf } for pid=2360 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:41.675000 audit: BPF prog-id=92 op=LOAD Jul 10 00:46:41.675000 audit[2360]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffd5dd5ca8 a2=40 a3=ffffd5dd5cd8 items=0 ppid=2215 pid=2360 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:46:41.675000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Jul 10 00:46:41.675000 audit: BPF prog-id=92 op=UNLOAD Jul 10 00:46:41.789759 systemd-networkd[1043]: vxlan.calico: Link UP Jul 10 00:46:41.789767 systemd-networkd[1043]: vxlan.calico: Gained carrier Jul 10 00:46:41.796000 audit[2387]: AVC avc: denied { bpf } for pid=2387 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:41.796000 audit[2387]: AVC avc: denied { bpf } for pid=2387 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:41.796000 audit[2387]: AVC avc: denied { perfmon } for pid=2387 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:41.796000 audit[2387]: AVC avc: denied { perfmon } for pid=2387 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:41.796000 audit[2387]: AVC avc: denied { perfmon } for pid=2387 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:41.796000 audit[2387]: AVC avc: denied { perfmon } for pid=2387 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:41.796000 audit[2387]: AVC avc: denied { perfmon } for pid=2387 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:41.796000 audit[2387]: AVC avc: denied { bpf } for pid=2387 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:41.796000 audit[2387]: AVC avc: denied { bpf } for pid=2387 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:41.796000 audit: BPF prog-id=93 op=LOAD Jul 10 00:46:41.796000 audit[2387]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffc91ba148 a2=98 a3=ffffc91ba138 items=0 ppid=2215 pid=2387 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:46:41.796000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 10 00:46:41.796000 audit: BPF prog-id=93 op=UNLOAD Jul 10 00:46:41.796000 audit[2387]: AVC avc: denied { bpf } for pid=2387 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:41.796000 audit[2387]: AVC avc: denied { bpf } for pid=2387 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:41.796000 audit[2387]: AVC avc: denied { perfmon } for pid=2387 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:41.796000 audit[2387]: AVC avc: denied { perfmon } for pid=2387 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:41.796000 audit[2387]: AVC avc: denied { perfmon } for pid=2387 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:41.796000 audit[2387]: AVC avc: denied { perfmon } for pid=2387 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:41.796000 audit[2387]: AVC avc: denied { perfmon } for pid=2387 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:41.796000 audit[2387]: AVC avc: denied { bpf } for pid=2387 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:41.796000 audit[2387]: AVC avc: denied { bpf } for pid=2387 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:41.796000 audit: BPF prog-id=94 op=LOAD Jul 10 00:46:41.796000 audit[2387]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffc91b9e28 a2=74 a3=95 items=0 ppid=2215 pid=2387 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:46:41.796000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 10 00:46:41.797000 audit: BPF prog-id=94 op=UNLOAD Jul 10 00:46:41.797000 audit[2387]: AVC avc: denied { bpf } for pid=2387 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:41.797000 audit[2387]: AVC avc: denied { bpf } for pid=2387 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:41.797000 audit[2387]: AVC avc: denied { perfmon } for pid=2387 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:41.797000 audit[2387]: AVC avc: denied { perfmon } for pid=2387 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:41.797000 audit[2387]: AVC avc: denied { perfmon } for pid=2387 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:41.797000 audit[2387]: AVC avc: denied { perfmon } for pid=2387 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:41.797000 audit[2387]: AVC avc: denied { perfmon } for pid=2387 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:41.797000 audit[2387]: AVC avc: denied { bpf } for pid=2387 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:41.797000 audit[2387]: AVC avc: denied { bpf } for pid=2387 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:41.797000 audit: BPF prog-id=95 op=LOAD Jul 10 00:46:41.797000 audit[2387]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffc91b9e88 a2=94 a3=2 items=0 ppid=2215 pid=2387 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:46:41.797000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 10 00:46:41.797000 audit: BPF prog-id=95 op=UNLOAD Jul 10 00:46:41.797000 audit[2387]: AVC avc: denied { bpf } for pid=2387 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:41.797000 audit[2387]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=ffffc91b9eb8 a2=28 a3=ffffc91b9fe8 items=0 ppid=2215 pid=2387 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:46:41.797000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 10 00:46:41.797000 audit[2387]: AVC avc: denied { bpf } for pid=2387 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:41.797000 audit[2387]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffc91b9ee8 a2=28 a3=ffffc91ba018 items=0 ppid=2215 pid=2387 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:46:41.797000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 10 00:46:41.797000 audit[2387]: AVC avc: denied { bpf } for pid=2387 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:41.797000 audit[2387]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffc91b9d98 a2=28 a3=ffffc91b9ec8 items=0 ppid=2215 pid=2387 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:46:41.797000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 10 00:46:41.797000 audit[2387]: AVC avc: denied { bpf } for pid=2387 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:41.797000 audit[2387]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=ffffc91b9f08 a2=28 a3=ffffc91ba038 items=0 ppid=2215 pid=2387 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:46:41.797000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 10 00:46:41.797000 audit[2387]: AVC avc: denied { bpf } for pid=2387 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:41.797000 audit[2387]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=ffffc91b9ee8 a2=28 a3=ffffc91ba018 items=0 ppid=2215 pid=2387 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:46:41.797000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 10 00:46:41.797000 audit[2387]: AVC avc: denied { bpf } for pid=2387 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:41.797000 audit[2387]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=ffffc91b9ed8 a2=28 a3=ffffc91ba008 items=0 ppid=2215 pid=2387 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:46:41.797000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 10 00:46:41.797000 audit[2387]: AVC avc: denied { bpf } for pid=2387 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:41.797000 audit[2387]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=ffffc91b9f08 a2=28 a3=ffffc91ba038 items=0 ppid=2215 pid=2387 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:46:41.797000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 10 00:46:41.797000 audit[2387]: AVC avc: denied { bpf } for pid=2387 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:41.797000 audit[2387]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffc91b9ee8 a2=28 a3=ffffc91ba018 items=0 ppid=2215 pid=2387 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:46:41.797000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 10 00:46:41.797000 audit[2387]: AVC avc: denied { bpf } for pid=2387 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:41.797000 audit[2387]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffc91b9f08 a2=28 a3=ffffc91ba038 items=0 ppid=2215 pid=2387 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:46:41.797000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 10 00:46:41.797000 audit[2387]: AVC avc: denied { bpf } for pid=2387 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:41.797000 audit[2387]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffc91b9ed8 a2=28 a3=ffffc91ba008 items=0 ppid=2215 pid=2387 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:46:41.797000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 10 00:46:41.797000 audit[2387]: AVC avc: denied { bpf } for pid=2387 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:41.797000 audit[2387]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=ffffc91b9f58 a2=28 a3=ffffc91ba098 items=0 ppid=2215 pid=2387 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:46:41.797000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 10 00:46:41.797000 audit[2387]: AVC avc: denied { bpf } for pid=2387 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:41.797000 audit[2387]: AVC avc: denied { bpf } for pid=2387 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:41.797000 audit[2387]: AVC avc: denied { perfmon } for pid=2387 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:41.797000 audit[2387]: AVC avc: denied { perfmon } for pid=2387 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:41.797000 audit[2387]: AVC avc: denied { perfmon } for pid=2387 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:41.797000 audit[2387]: AVC avc: denied { perfmon } for pid=2387 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:41.797000 audit[2387]: AVC avc: denied { perfmon } for pid=2387 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:41.797000 audit[2387]: AVC avc: denied { bpf } for pid=2387 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:41.797000 audit[2387]: AVC avc: denied { bpf } for pid=2387 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:41.797000 audit: BPF prog-id=96 op=LOAD Jul 10 00:46:41.797000 audit[2387]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=ffffc91b9d78 a2=40 a3=ffffc91b9da8 items=0 ppid=2215 pid=2387 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:46:41.797000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 10 00:46:41.797000 audit: BPF prog-id=96 op=UNLOAD Jul 10 00:46:41.797000 audit[2387]: AVC avc: denied { bpf } for pid=2387 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:41.797000 audit[2387]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=0 a1=ffffc91b9da0 a2=50 a3=0 items=0 ppid=2215 pid=2387 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:46:41.797000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 10 00:46:41.797000 audit[2387]: AVC avc: denied { bpf } for pid=2387 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:41.797000 audit[2387]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=0 a1=ffffc91b9da0 a2=50 a3=0 items=0 ppid=2215 pid=2387 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:46:41.797000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 10 00:46:41.797000 audit[2387]: AVC avc: denied { bpf } for pid=2387 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:41.797000 audit[2387]: AVC avc: denied { bpf } for pid=2387 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:41.797000 audit[2387]: AVC avc: denied { bpf } for pid=2387 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:41.797000 audit[2387]: AVC avc: denied { perfmon } for pid=2387 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:41.797000 audit[2387]: AVC avc: denied { perfmon } for pid=2387 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:41.797000 audit[2387]: AVC avc: denied { perfmon } for pid=2387 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:41.797000 audit[2387]: AVC avc: denied { perfmon } for pid=2387 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:41.797000 audit[2387]: AVC avc: denied { perfmon } for pid=2387 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:41.797000 audit[2387]: AVC avc: denied { bpf } for pid=2387 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:41.797000 audit[2387]: AVC avc: denied { bpf } for pid=2387 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:41.797000 audit: BPF prog-id=97 op=LOAD Jul 10 00:46:41.797000 audit[2387]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=ffffc91b9508 a2=94 a3=2 items=0 ppid=2215 pid=2387 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:46:41.797000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 10 00:46:41.797000 audit: BPF prog-id=97 op=UNLOAD Jul 10 00:46:41.797000 audit[2387]: AVC avc: denied { bpf } for pid=2387 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:41.797000 audit[2387]: AVC avc: denied { bpf } for pid=2387 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:41.797000 audit[2387]: AVC avc: denied { bpf } for pid=2387 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:41.797000 audit[2387]: AVC avc: denied { perfmon } for pid=2387 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:41.797000 audit[2387]: AVC avc: denied { perfmon } for pid=2387 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:41.797000 audit[2387]: AVC avc: denied { perfmon } for pid=2387 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:41.797000 audit[2387]: AVC avc: denied { perfmon } for pid=2387 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:41.797000 audit[2387]: AVC avc: denied { perfmon } for pid=2387 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:41.797000 audit[2387]: AVC avc: denied { bpf } for pid=2387 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:41.797000 audit[2387]: AVC avc: denied { bpf } for pid=2387 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:41.797000 audit: BPF prog-id=98 op=LOAD Jul 10 00:46:41.797000 audit[2387]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=ffffc91b9698 a2=94 a3=30 items=0 ppid=2215 pid=2387 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:46:41.797000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 10 00:46:41.803000 audit[2390]: AVC avc: denied { bpf } for pid=2390 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:41.803000 audit[2390]: AVC avc: denied { bpf } for pid=2390 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:41.803000 audit[2390]: AVC avc: denied { perfmon } for pid=2390 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:41.803000 audit[2390]: AVC avc: denied { perfmon } for pid=2390 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:41.803000 audit[2390]: AVC avc: denied { perfmon } for pid=2390 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:41.803000 audit[2390]: AVC avc: denied { perfmon } for pid=2390 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:41.803000 audit[2390]: AVC avc: denied { perfmon } for pid=2390 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:41.803000 audit[2390]: AVC avc: denied { bpf } for pid=2390 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:41.803000 audit[2390]: AVC avc: denied { bpf } for pid=2390 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:41.803000 audit: BPF prog-id=99 op=LOAD Jul 10 00:46:41.803000 audit[2390]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffcb5e8aa8 a2=98 a3=ffffcb5e8a98 items=0 ppid=2215 pid=2390 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:46:41.803000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 10 00:46:41.803000 audit: BPF prog-id=99 op=UNLOAD Jul 10 00:46:41.803000 audit[2390]: AVC avc: denied { bpf } for pid=2390 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:41.803000 audit[2390]: AVC avc: denied { bpf } for pid=2390 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:41.803000 audit[2390]: AVC avc: denied { perfmon } for pid=2390 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:41.803000 audit[2390]: AVC avc: denied { perfmon } for pid=2390 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:41.803000 audit[2390]: AVC avc: denied { perfmon } for pid=2390 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:41.803000 audit[2390]: AVC avc: denied { perfmon } for pid=2390 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:41.803000 audit[2390]: AVC avc: denied { perfmon } for pid=2390 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:41.803000 audit[2390]: AVC avc: denied { bpf } for pid=2390 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:41.803000 audit[2390]: AVC avc: denied { bpf } for pid=2390 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:41.803000 audit: BPF prog-id=100 op=LOAD Jul 10 00:46:41.803000 audit[2390]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=ffffcb5e8738 a2=74 a3=95 items=0 ppid=2215 pid=2390 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:46:41.803000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 10 00:46:41.803000 audit: BPF prog-id=100 op=UNLOAD Jul 10 00:46:41.803000 audit[2390]: AVC avc: denied { bpf } for pid=2390 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:41.803000 audit[2390]: AVC avc: denied { bpf } for pid=2390 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:41.803000 audit[2390]: AVC avc: denied { perfmon } for pid=2390 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:41.803000 audit[2390]: AVC avc: denied { perfmon } for pid=2390 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:41.803000 audit[2390]: AVC avc: denied { perfmon } for pid=2390 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:41.803000 audit[2390]: AVC avc: denied { perfmon } for pid=2390 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:41.803000 audit[2390]: AVC avc: denied { perfmon } for pid=2390 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:41.803000 audit[2390]: AVC avc: denied { bpf } for pid=2390 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:41.803000 audit[2390]: AVC avc: denied { bpf } for pid=2390 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:41.803000 audit: BPF prog-id=101 op=LOAD Jul 10 00:46:41.803000 audit[2390]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=ffffcb5e8798 a2=94 a3=2 items=0 ppid=2215 pid=2390 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:46:41.803000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 10 00:46:41.803000 audit: BPF prog-id=101 op=UNLOAD Jul 10 00:46:41.893000 audit[2390]: AVC avc: denied { bpf } for pid=2390 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:41.893000 audit[2390]: AVC avc: denied { bpf } for pid=2390 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:41.893000 audit[2390]: AVC avc: denied { perfmon } for pid=2390 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:41.893000 audit[2390]: AVC avc: denied { perfmon } for pid=2390 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:41.893000 audit[2390]: AVC avc: denied { perfmon } for pid=2390 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:41.893000 audit[2390]: AVC avc: denied { perfmon } for pid=2390 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:41.893000 audit[2390]: AVC avc: denied { perfmon } for pid=2390 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:41.893000 audit[2390]: AVC avc: denied { bpf } for pid=2390 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:41.893000 audit[2390]: AVC avc: denied { bpf } for pid=2390 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:41.893000 audit: BPF prog-id=102 op=LOAD Jul 10 00:46:41.893000 audit[2390]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=ffffcb5e8758 a2=40 a3=ffffcb5e8788 items=0 ppid=2215 pid=2390 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:46:41.893000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 10 00:46:41.893000 audit: BPF prog-id=102 op=UNLOAD Jul 10 00:46:41.893000 audit[2390]: AVC avc: denied { perfmon } for pid=2390 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:41.893000 audit[2390]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=0 a1=ffffcb5e8870 a2=50 a3=0 items=0 ppid=2215 pid=2390 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:46:41.893000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 10 00:46:41.902000 audit[2390]: AVC avc: denied { bpf } for pid=2390 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:41.902000 audit[2390]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffcb5e87c8 a2=28 a3=ffffcb5e88f8 items=0 ppid=2215 pid=2390 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:46:41.902000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 10 00:46:41.902000 audit[2390]: AVC avc: denied { bpf } for pid=2390 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:41.902000 audit[2390]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffcb5e87f8 a2=28 a3=ffffcb5e8928 items=0 ppid=2215 pid=2390 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:46:41.902000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 10 00:46:41.902000 audit[2390]: AVC avc: denied { bpf } for pid=2390 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:41.902000 audit[2390]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffcb5e86a8 a2=28 a3=ffffcb5e87d8 items=0 ppid=2215 pid=2390 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:46:41.902000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 10 00:46:41.902000 audit[2390]: AVC avc: denied { bpf } for pid=2390 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:41.902000 audit[2390]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffcb5e8818 a2=28 a3=ffffcb5e8948 items=0 ppid=2215 pid=2390 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:46:41.902000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 10 00:46:41.902000 audit[2390]: AVC avc: denied { bpf } for pid=2390 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:41.902000 audit[2390]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffcb5e87f8 a2=28 a3=ffffcb5e8928 items=0 ppid=2215 pid=2390 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:46:41.902000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 10 00:46:41.902000 audit[2390]: AVC avc: denied { bpf } for pid=2390 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:41.902000 audit[2390]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffcb5e87e8 a2=28 a3=ffffcb5e8918 items=0 ppid=2215 pid=2390 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:46:41.902000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 10 00:46:41.902000 audit[2390]: AVC avc: denied { bpf } for pid=2390 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:41.902000 audit[2390]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffcb5e8818 a2=28 a3=ffffcb5e8948 items=0 ppid=2215 pid=2390 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:46:41.902000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 10 00:46:41.902000 audit[2390]: AVC avc: denied { bpf } for pid=2390 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:41.902000 audit[2390]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffcb5e87f8 a2=28 a3=ffffcb5e8928 items=0 ppid=2215 pid=2390 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:46:41.902000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 10 00:46:41.902000 audit[2390]: AVC avc: denied { bpf } for pid=2390 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:41.902000 audit[2390]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffcb5e8818 a2=28 a3=ffffcb5e8948 items=0 ppid=2215 pid=2390 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:46:41.902000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 10 00:46:41.902000 audit[2390]: AVC avc: denied { bpf } for pid=2390 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:41.902000 audit[2390]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffcb5e87e8 a2=28 a3=ffffcb5e8918 items=0 ppid=2215 pid=2390 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:46:41.902000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 10 00:46:41.902000 audit[2390]: AVC avc: denied { bpf } for pid=2390 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:41.902000 audit[2390]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffcb5e8868 a2=28 a3=ffffcb5e89a8 items=0 ppid=2215 pid=2390 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:46:41.902000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 10 00:46:41.902000 audit[2390]: AVC avc: denied { perfmon } for pid=2390 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:41.902000 audit[2390]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=0 a1=ffffcb5e85a0 a2=50 a3=0 items=0 ppid=2215 pid=2390 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:46:41.902000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 10 00:46:41.902000 audit[2390]: AVC avc: denied { bpf } for pid=2390 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:41.902000 audit[2390]: AVC avc: denied { bpf } for pid=2390 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:41.902000 audit[2390]: AVC avc: denied { perfmon } for pid=2390 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:41.902000 audit[2390]: AVC avc: denied { perfmon } for pid=2390 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:41.902000 audit[2390]: AVC avc: denied { perfmon } for pid=2390 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:41.902000 audit[2390]: AVC avc: denied { perfmon } for pid=2390 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:41.902000 audit[2390]: AVC avc: denied { perfmon } for pid=2390 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:41.902000 audit[2390]: AVC avc: denied { bpf } for pid=2390 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:41.902000 audit[2390]: AVC avc: denied { bpf } for pid=2390 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:41.902000 audit: BPF prog-id=103 op=LOAD Jul 10 00:46:41.902000 audit[2390]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=ffffcb5e85a8 a2=94 a3=5 items=0 ppid=2215 pid=2390 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:46:41.902000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 10 00:46:41.902000 audit: BPF prog-id=103 op=UNLOAD Jul 10 00:46:41.902000 audit[2390]: AVC avc: denied { perfmon } for pid=2390 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:41.902000 audit[2390]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=0 a1=ffffcb5e86b0 a2=50 a3=0 items=0 ppid=2215 pid=2390 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:46:41.902000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 10 00:46:41.902000 audit[2390]: AVC avc: denied { bpf } for pid=2390 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:41.902000 audit[2390]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=16 a1=ffffcb5e87f8 a2=4 a3=3 items=0 ppid=2215 pid=2390 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:46:41.902000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 10 00:46:41.902000 audit[2390]: AVC avc: denied { bpf } for pid=2390 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:41.902000 audit[2390]: AVC avc: denied { bpf } for pid=2390 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:41.902000 audit[2390]: AVC avc: denied { perfmon } for pid=2390 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:41.902000 audit[2390]: AVC avc: denied { bpf } for pid=2390 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:41.902000 audit[2390]: AVC avc: denied { perfmon } for pid=2390 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:41.902000 audit[2390]: AVC avc: denied { perfmon } for pid=2390 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:41.902000 audit[2390]: AVC avc: denied { perfmon } for pid=2390 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:41.902000 audit[2390]: AVC avc: denied { perfmon } for pid=2390 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:41.902000 audit[2390]: AVC avc: denied { perfmon } for pid=2390 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:41.902000 audit[2390]: AVC avc: denied { bpf } for pid=2390 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:41.902000 audit[2390]: AVC avc: denied { confidentiality } for pid=2390 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:46:41.902000 audit[2390]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=ffffcb5e87d8 a2=94 a3=6 items=0 ppid=2215 pid=2390 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:46:41.902000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 10 00:46:41.903000 audit[2390]: AVC avc: denied { bpf } for pid=2390 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:41.903000 audit[2390]: AVC avc: denied { bpf } for pid=2390 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:41.903000 audit[2390]: AVC avc: denied { perfmon } for pid=2390 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:41.903000 audit[2390]: AVC avc: denied { bpf } for pid=2390 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:41.903000 audit[2390]: AVC avc: denied { perfmon } for pid=2390 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:41.903000 audit[2390]: AVC avc: denied { perfmon } for pid=2390 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:41.903000 audit[2390]: AVC avc: denied { perfmon } for pid=2390 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:41.903000 audit[2390]: AVC avc: denied { perfmon } for pid=2390 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:41.903000 audit[2390]: AVC avc: denied { perfmon } for pid=2390 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:41.903000 audit[2390]: AVC avc: denied { bpf } for pid=2390 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:41.903000 audit[2390]: AVC avc: denied { confidentiality } for pid=2390 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:46:41.903000 audit[2390]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=ffffcb5e7fa8 a2=94 a3=83 items=0 ppid=2215 pid=2390 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:46:41.903000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 10 00:46:41.903000 audit[2390]: AVC avc: denied { bpf } for pid=2390 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:41.903000 audit[2390]: AVC avc: denied { bpf } for pid=2390 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:41.903000 audit[2390]: AVC avc: denied { perfmon } for pid=2390 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:41.903000 audit[2390]: AVC avc: denied { bpf } for pid=2390 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:41.903000 audit[2390]: AVC avc: denied { perfmon } for pid=2390 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:41.903000 audit[2390]: AVC avc: denied { perfmon } for pid=2390 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:41.903000 audit[2390]: AVC avc: denied { perfmon } for pid=2390 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:41.903000 audit[2390]: AVC avc: denied { perfmon } for pid=2390 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:41.903000 audit[2390]: AVC avc: denied { perfmon } for pid=2390 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:41.903000 audit[2390]: AVC avc: denied { bpf } for pid=2390 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:41.903000 audit[2390]: AVC avc: denied { confidentiality } for pid=2390 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:46:41.903000 audit[2390]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=ffffcb5e7fa8 a2=94 a3=83 items=0 ppid=2215 pid=2390 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:46:41.903000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 10 00:46:41.903000 audit[2390]: AVC avc: denied { bpf } for pid=2390 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:41.903000 audit[2390]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffcb5e99e8 a2=10 a3=ffffcb5e9ad8 items=0 ppid=2215 pid=2390 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:46:41.903000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 10 00:46:41.903000 audit[2390]: AVC avc: denied { bpf } for pid=2390 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:41.903000 audit[2390]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffcb5e98a8 a2=10 a3=ffffcb5e9998 items=0 ppid=2215 pid=2390 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:46:41.903000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 10 00:46:41.903000 audit[2390]: AVC avc: denied { bpf } for pid=2390 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:41.903000 audit[2390]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffcb5e9818 a2=10 a3=ffffcb5e9998 items=0 ppid=2215 pid=2390 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:46:41.903000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 10 00:46:41.903000 audit[2390]: AVC avc: denied { bpf } for pid=2390 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:41.903000 audit[2390]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffcb5e9818 a2=10 a3=ffffcb5e9998 items=0 ppid=2215 pid=2390 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:46:41.903000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 10 00:46:41.912000 audit: BPF prog-id=98 op=UNLOAD Jul 10 00:46:41.955000 audit[2418]: NETFILTER_CFG table=mangle:73 family=2 entries=16 op=nft_register_chain pid=2418 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 10 00:46:41.955000 audit[2418]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6868 a0=3 a1=ffffc56a6120 a2=0 a3=ffff80239fa8 items=0 ppid=2215 pid=2418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:46:41.955000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 10 00:46:41.959000 audit[2417]: NETFILTER_CFG table=nat:74 family=2 entries=15 op=nft_register_chain pid=2417 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 10 00:46:41.959000 audit[2417]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5084 a0=3 a1=ffffe8c213e0 a2=0 a3=ffff8f240fa8 items=0 ppid=2215 pid=2417 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:46:41.959000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 10 00:46:41.966000 audit[2416]: NETFILTER_CFG table=raw:75 family=2 entries=21 op=nft_register_chain pid=2416 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 10 00:46:41.966000 audit[2416]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=8452 a0=3 a1=ffffe8dc4570 a2=0 a3=ffff925c1fa8 items=0 ppid=2215 pid=2416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:46:41.966000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 10 00:46:41.969000 audit[2421]: NETFILTER_CFG table=filter:76 family=2 entries=73 op=nft_register_chain pid=2421 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 10 00:46:41.969000 audit[2421]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=38580 a0=3 a1=ffffe6d2cd20 a2=0 a3=ffff87d10fa8 items=0 ppid=2215 pid=2421 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:46:41.969000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 10 00:46:42.079939 kubelet[1452]: E0710 00:46:42.079826 1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 00:46:42.194863 systemd-networkd[1043]: cali2ae3e1a7830: Gained IPv6LL Jul 10 00:46:42.642774 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1821977659.mount: Deactivated successfully. Jul 10 00:46:43.080126 kubelet[1452]: E0710 00:46:43.080057 1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 00:46:43.155431 systemd-networkd[1043]: vxlan.calico: Gained IPv6LL Jul 10 00:46:43.851705 env[1213]: time="2025-07-10T00:46:43.851649313Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 10 00:46:43.853366 env[1213]: time="2025-07-10T00:46:43.853322103Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:cd8b38a4e22587134e82fff3512a99b84799274d989a1ec20f58c7f8c89b8511,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 10 00:46:43.855712 env[1213]: time="2025-07-10T00:46:43.855673757Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 10 00:46:43.858113 env[1213]: time="2025-07-10T00:46:43.858074110Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx@sha256:30bb68e656e0665bce700e67d2756f68bdca3345fa1099a32bfdb8febcf621cd,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 10 00:46:43.858989 env[1213]: time="2025-07-10T00:46:43.858950322Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:cd8b38a4e22587134e82fff3512a99b84799274d989a1ec20f58c7f8c89b8511\"" Jul 10 00:46:43.863388 env[1213]: time="2025-07-10T00:46:43.863343877Z" level=info msg="CreateContainer within sandbox \"82286403d2eabbfce98e3304bac6b8db6c95586e044c086c5ac1e3f7745583fc\" for container &ContainerMetadata{Name:nginx,Attempt:0,}" Jul 10 00:46:43.873200 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2562101253.mount: Deactivated successfully. Jul 10 00:46:43.875148 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount847784256.mount: Deactivated successfully. Jul 10 00:46:43.875569 env[1213]: time="2025-07-10T00:46:43.875531213Z" level=info msg="CreateContainer within sandbox \"82286403d2eabbfce98e3304bac6b8db6c95586e044c086c5ac1e3f7745583fc\" for &ContainerMetadata{Name:nginx,Attempt:0,} returns container id \"829c4779318336d0679a250c5f1f31c95474dd06064dc6149dabdaf9fb525f59\"" Jul 10 00:46:43.876506 env[1213]: time="2025-07-10T00:46:43.876466462Z" level=info msg="StartContainer for \"829c4779318336d0679a250c5f1f31c95474dd06064dc6149dabdaf9fb525f59\"" Jul 10 00:46:43.894987 systemd[1]: Started cri-containerd-829c4779318336d0679a250c5f1f31c95474dd06064dc6149dabdaf9fb525f59.scope. Jul 10 00:46:43.933000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:43.933000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:43.933000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:43.933000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:43.933000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:43.933000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:43.933000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:43.933000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:43.933000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:43.933000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:43.933000 audit: BPF prog-id=104 op=LOAD Jul 10 00:46:43.934000 audit[2464]: AVC avc: denied { bpf } for pid=2464 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:43.934000 audit[2464]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=2172 pid=2464 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:46:43.934000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3832396334373739333138333336643036373961323530633566316633 Jul 10 00:46:43.934000 audit[2464]: AVC avc: denied { perfmon } for pid=2464 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:43.934000 audit[2464]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2172 pid=2464 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:46:43.934000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3832396334373739333138333336643036373961323530633566316633 Jul 10 00:46:43.934000 audit[2464]: AVC avc: denied { bpf } for pid=2464 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:43.934000 audit[2464]: AVC avc: denied { bpf } for pid=2464 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:43.934000 audit[2464]: AVC avc: denied { bpf } for pid=2464 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:43.934000 audit[2464]: AVC avc: denied { perfmon } for pid=2464 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:43.934000 audit[2464]: AVC avc: denied { perfmon } for pid=2464 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:43.934000 audit[2464]: AVC avc: denied { perfmon } for pid=2464 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:43.934000 audit[2464]: AVC avc: denied { perfmon } for pid=2464 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:43.934000 audit[2464]: AVC avc: denied { perfmon } for pid=2464 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:43.934000 audit[2464]: AVC avc: denied { bpf } for pid=2464 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:43.934000 audit[2464]: AVC avc: denied { bpf } for pid=2464 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:43.934000 audit: BPF prog-id=105 op=LOAD Jul 10 00:46:43.934000 audit[2464]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=2172 pid=2464 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:46:43.934000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3832396334373739333138333336643036373961323530633566316633 Jul 10 00:46:43.934000 audit[2464]: AVC avc: denied { bpf } for pid=2464 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:43.934000 audit[2464]: AVC avc: denied { bpf } for pid=2464 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:43.934000 audit[2464]: AVC avc: denied { perfmon } for pid=2464 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:43.934000 audit[2464]: AVC avc: denied { perfmon } for pid=2464 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:43.934000 audit[2464]: AVC avc: denied { perfmon } for pid=2464 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:43.934000 audit[2464]: AVC avc: denied { perfmon } for pid=2464 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:43.934000 audit[2464]: AVC avc: denied { perfmon } for pid=2464 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:43.934000 audit[2464]: AVC avc: denied { bpf } for pid=2464 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:43.934000 audit[2464]: AVC avc: denied { bpf } for pid=2464 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:43.934000 audit: BPF prog-id=106 op=LOAD Jul 10 00:46:43.934000 audit[2464]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=2172 pid=2464 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:46:43.934000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3832396334373739333138333336643036373961323530633566316633 Jul 10 00:46:43.934000 audit: BPF prog-id=106 op=UNLOAD Jul 10 00:46:43.934000 audit: BPF prog-id=105 op=UNLOAD Jul 10 00:46:43.934000 audit[2464]: AVC avc: denied { bpf } for pid=2464 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:43.934000 audit[2464]: AVC avc: denied { bpf } for pid=2464 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:43.934000 audit[2464]: AVC avc: denied { bpf } for pid=2464 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:43.934000 audit[2464]: AVC avc: denied { perfmon } for pid=2464 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:43.934000 audit[2464]: AVC avc: denied { perfmon } for pid=2464 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:43.934000 audit[2464]: AVC avc: denied { perfmon } for pid=2464 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:43.934000 audit[2464]: AVC avc: denied { perfmon } for pid=2464 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:43.934000 audit[2464]: AVC avc: denied { perfmon } for pid=2464 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:43.934000 audit[2464]: AVC avc: denied { bpf } for pid=2464 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:43.934000 audit[2464]: AVC avc: denied { bpf } for pid=2464 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:43.934000 audit: BPF prog-id=107 op=LOAD Jul 10 00:46:43.934000 audit[2464]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=2172 pid=2464 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:46:43.934000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3832396334373739333138333336643036373961323530633566316633 Jul 10 00:46:43.946180 env[1213]: time="2025-07-10T00:46:43.945963485Z" level=info msg="StartContainer for \"829c4779318336d0679a250c5f1f31c95474dd06064dc6149dabdaf9fb525f59\" returns successfully" Jul 10 00:46:44.080366 kubelet[1452]: E0710 00:46:44.080320 1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 00:46:44.306564 kubelet[1452]: I0710 00:46:44.306444 1452 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="default/nginx-deployment-7fcdb87857-pl76q" podStartSLOduration=3.071628246 podStartE2EDuration="6.30642932s" podCreationTimestamp="2025-07-10 00:46:38 +0000 UTC" firstStartedPulling="2025-07-10 00:46:40.625373055 +0000 UTC m=+14.320478092" lastFinishedPulling="2025-07-10 00:46:43.860174129 +0000 UTC m=+17.555279166" observedRunningTime="2025-07-10 00:46:44.3055524 +0000 UTC m=+18.000657517" watchObservedRunningTime="2025-07-10 00:46:44.30642932 +0000 UTC m=+18.001534317" Jul 10 00:46:45.081185 kubelet[1452]: E0710 00:46:45.081135 1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 00:46:46.081562 kubelet[1452]: E0710 00:46:46.081475 1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 00:46:46.096000 audit[2514]: NETFILTER_CFG table=filter:77 family=2 entries=11 op=nft_register_rule pid=2514 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 10 00:46:46.100280 kernel: kauditd_printk_skb: 704 callbacks suppressed Jul 10 00:46:46.100413 kernel: audit: type=1325 audit(1752108406.096:688): table=filter:77 family=2 entries=11 op=nft_register_rule pid=2514 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 10 00:46:46.100456 kernel: audit: type=1300 audit(1752108406.096:688): arch=c00000b7 syscall=211 success=yes exit=3760 a0=3 a1=ffffca323bb0 a2=0 a3=1 items=0 ppid=1614 pid=2514 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:46:46.096000 audit[2514]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3760 a0=3 a1=ffffca323bb0 a2=0 a3=1 items=0 ppid=1614 pid=2514 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:46:46.096000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 10 00:46:46.105798 kernel: audit: type=1327 audit(1752108406.096:688): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 10 00:46:46.107462 kernel: audit: type=1325 audit(1752108406.105:689): table=nat:78 family=2 entries=29 op=nft_register_chain pid=2514 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 10 00:46:46.105000 audit[2514]: NETFILTER_CFG table=nat:78 family=2 entries=29 op=nft_register_chain pid=2514 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 10 00:46:46.105000 audit[2514]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=10116 a0=3 a1=ffffca323bb0 a2=0 a3=1 items=0 ppid=1614 pid=2514 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:46:46.112890 kernel: audit: type=1300 audit(1752108406.105:689): arch=c00000b7 syscall=211 success=yes exit=10116 a0=3 a1=ffffca323bb0 a2=0 a3=1 items=0 ppid=1614 pid=2514 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:46:46.112997 kernel: audit: type=1327 audit(1752108406.105:689): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 10 00:46:46.105000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 10 00:46:46.716000 audit[2516]: NETFILTER_CFG table=filter:79 family=2 entries=9 op=nft_register_rule pid=2516 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 10 00:46:46.716000 audit[2516]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3016 a0=3 a1=ffffd2440430 a2=0 a3=1 items=0 ppid=1614 pid=2516 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:46:46.724125 kernel: audit: type=1325 audit(1752108406.716:690): table=filter:79 family=2 entries=9 op=nft_register_rule pid=2516 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 10 00:46:46.724224 kernel: audit: type=1300 audit(1752108406.716:690): arch=c00000b7 syscall=211 success=yes exit=3016 a0=3 a1=ffffd2440430 a2=0 a3=1 items=0 ppid=1614 pid=2516 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:46:46.724281 kernel: audit: type=1327 audit(1752108406.716:690): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 10 00:46:46.716000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 10 00:46:46.729000 audit[2516]: NETFILTER_CFG table=nat:80 family=2 entries=31 op=nft_register_chain pid=2516 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 10 00:46:46.729000 audit[2516]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=10884 a0=3 a1=ffffd2440430 a2=0 a3=1 items=0 ppid=1614 pid=2516 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:46:46.729000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 10 00:46:46.734525 kernel: audit: type=1325 audit(1752108406.729:691): table=nat:80 family=2 entries=31 op=nft_register_chain pid=2516 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 10 00:46:47.070129 kubelet[1452]: E0710 00:46:47.070001 1452 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 00:46:47.082548 kubelet[1452]: E0710 00:46:47.082515 1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 00:46:48.083266 kubelet[1452]: E0710 00:46:48.083207 1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 00:46:49.083682 kubelet[1452]: E0710 00:46:49.083638 1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 00:46:50.084207 kubelet[1452]: E0710 00:46:50.084157 1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 00:46:50.556000 audit[2526]: NETFILTER_CFG table=filter:81 family=2 entries=20 op=nft_register_rule pid=2526 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 10 00:46:50.556000 audit[2526]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=11944 a0=3 a1=ffffed3cf5b0 a2=0 a3=1 items=0 ppid=1614 pid=2526 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:46:50.556000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 10 00:46:50.561000 audit[2526]: NETFILTER_CFG table=nat:82 family=2 entries=26 op=nft_register_rule pid=2526 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 10 00:46:50.561000 audit[2526]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=8076 a0=3 a1=ffffed3cf5b0 a2=0 a3=1 items=0 ppid=1614 pid=2526 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:46:50.561000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 10 00:46:50.580000 audit[2528]: NETFILTER_CFG table=filter:83 family=2 entries=32 op=nft_register_rule pid=2528 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 10 00:46:50.580000 audit[2528]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=11944 a0=3 a1=fffff7d04480 a2=0 a3=1 items=0 ppid=1614 pid=2528 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:46:50.580000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 10 00:46:50.587000 audit[2528]: NETFILTER_CFG table=nat:84 family=2 entries=26 op=nft_register_rule pid=2528 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 10 00:46:50.587000 audit[2528]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=8076 a0=3 a1=fffff7d04480 a2=0 a3=1 items=0 ppid=1614 pid=2528 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:46:50.587000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 10 00:46:50.627568 systemd[1]: Created slice kubepods-besteffort-pod27808bcc_70fb_48e9_a1d7_acb86c304187.slice. Jul 10 00:46:50.817174 kubelet[1452]: I0710 00:46:50.817065 1452 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"data\" (UniqueName: \"kubernetes.io/empty-dir/27808bcc-70fb-48e9-a1d7-acb86c304187-data\") pod \"nfs-server-provisioner-0\" (UID: \"27808bcc-70fb-48e9-a1d7-acb86c304187\") " pod="default/nfs-server-provisioner-0" Jul 10 00:46:50.817174 kubelet[1452]: I0710 00:46:50.817109 1452 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-dkprq\" (UniqueName: \"kubernetes.io/projected/27808bcc-70fb-48e9-a1d7-acb86c304187-kube-api-access-dkprq\") pod \"nfs-server-provisioner-0\" (UID: \"27808bcc-70fb-48e9-a1d7-acb86c304187\") " pod="default/nfs-server-provisioner-0" Jul 10 00:46:51.084398 kubelet[1452]: E0710 00:46:51.084285 1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 00:46:51.230765 env[1213]: time="2025-07-10T00:46:51.230713995Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:27808bcc-70fb-48e9-a1d7-acb86c304187,Namespace:default,Attempt:0,}" Jul 10 00:46:51.339733 systemd-networkd[1043]: cali60e51b789ff: Link UP Jul 10 00:46:51.341658 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Jul 10 00:46:51.341720 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali60e51b789ff: link becomes ready Jul 10 00:46:51.341805 systemd-networkd[1043]: cali60e51b789ff: Gained carrier Jul 10 00:46:51.358621 env[1213]: 2025-07-10 00:46:51.275 [INFO][2531] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.0.0.135-k8s-nfs--server--provisioner--0-eth0 nfs-server-provisioner- default 27808bcc-70fb-48e9-a1d7-acb86c304187 1297 0 2025-07-10 00:46:50 +0000 UTC map[app:nfs-server-provisioner apps.kubernetes.io/pod-index:0 chart:nfs-server-provisioner-1.8.0 controller-revision-hash:nfs-server-provisioner-d5cbb7f57 heritage:Helm projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:nfs-server-provisioner release:nfs-server-provisioner statefulset.kubernetes.io/pod-name:nfs-server-provisioner-0] map[] [] [] []} {k8s 10.0.0.135 nfs-server-provisioner-0 eth0 nfs-server-provisioner [] [] [kns.default ksa.default.nfs-server-provisioner] cali60e51b789ff [{nfs TCP 2049 0 } {nfs-udp UDP 2049 0 } {nlockmgr TCP 32803 0 } {nlockmgr-udp UDP 32803 0 } {mountd TCP 20048 0 } {mountd-udp UDP 20048 0 } {rquotad TCP 875 0 } {rquotad-udp UDP 875 0 } {rpcbind TCP 111 0 } {rpcbind-udp UDP 111 0 } {statd TCP 662 0 } {statd-udp UDP 662 0 }] [] }} ContainerID="abde914a43eff402f3576b7a26e0c34653492e8e112bc672830b94fb5acfa272" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.135-k8s-nfs--server--provisioner--0-" Jul 10 00:46:51.358621 env[1213]: 2025-07-10 00:46:51.275 [INFO][2531] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="abde914a43eff402f3576b7a26e0c34653492e8e112bc672830b94fb5acfa272" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.135-k8s-nfs--server--provisioner--0-eth0" Jul 10 00:46:51.358621 env[1213]: 2025-07-10 00:46:51.298 [INFO][2545] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="abde914a43eff402f3576b7a26e0c34653492e8e112bc672830b94fb5acfa272" HandleID="k8s-pod-network.abde914a43eff402f3576b7a26e0c34653492e8e112bc672830b94fb5acfa272" Workload="10.0.0.135-k8s-nfs--server--provisioner--0-eth0" Jul 10 00:46:51.358621 env[1213]: 2025-07-10 00:46:51.298 [INFO][2545] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="abde914a43eff402f3576b7a26e0c34653492e8e112bc672830b94fb5acfa272" HandleID="k8s-pod-network.abde914a43eff402f3576b7a26e0c34653492e8e112bc672830b94fb5acfa272" Workload="10.0.0.135-k8s-nfs--server--provisioner--0-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x400004c7d0), Attrs:map[string]string{"namespace":"default", "node":"10.0.0.135", "pod":"nfs-server-provisioner-0", "timestamp":"2025-07-10 00:46:51.298319801 +0000 UTC"}, Hostname:"10.0.0.135", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Jul 10 00:46:51.358621 env[1213]: 2025-07-10 00:46:51.298 [INFO][2545] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Jul 10 00:46:51.358621 env[1213]: 2025-07-10 00:46:51.298 [INFO][2545] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Jul 10 00:46:51.358621 env[1213]: 2025-07-10 00:46:51.298 [INFO][2545] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.0.0.135' Jul 10 00:46:51.358621 env[1213]: 2025-07-10 00:46:51.311 [INFO][2545] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.abde914a43eff402f3576b7a26e0c34653492e8e112bc672830b94fb5acfa272" host="10.0.0.135" Jul 10 00:46:51.358621 env[1213]: 2025-07-10 00:46:51.316 [INFO][2545] ipam/ipam.go 394: Looking up existing affinities for host host="10.0.0.135" Jul 10 00:46:51.358621 env[1213]: 2025-07-10 00:46:51.321 [INFO][2545] ipam/ipam.go 511: Trying affinity for 192.168.36.128/26 host="10.0.0.135" Jul 10 00:46:51.358621 env[1213]: 2025-07-10 00:46:51.323 [INFO][2545] ipam/ipam.go 158: Attempting to load block cidr=192.168.36.128/26 host="10.0.0.135" Jul 10 00:46:51.358621 env[1213]: 2025-07-10 00:46:51.325 [INFO][2545] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.36.128/26 host="10.0.0.135" Jul 10 00:46:51.358621 env[1213]: 2025-07-10 00:46:51.325 [INFO][2545] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.36.128/26 handle="k8s-pod-network.abde914a43eff402f3576b7a26e0c34653492e8e112bc672830b94fb5acfa272" host="10.0.0.135" Jul 10 00:46:51.358621 env[1213]: 2025-07-10 00:46:51.327 [INFO][2545] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.abde914a43eff402f3576b7a26e0c34653492e8e112bc672830b94fb5acfa272 Jul 10 00:46:51.358621 env[1213]: 2025-07-10 00:46:51.331 [INFO][2545] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.36.128/26 handle="k8s-pod-network.abde914a43eff402f3576b7a26e0c34653492e8e112bc672830b94fb5acfa272" host="10.0.0.135" Jul 10 00:46:51.358621 env[1213]: 2025-07-10 00:46:51.335 [INFO][2545] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.36.130/26] block=192.168.36.128/26 handle="k8s-pod-network.abde914a43eff402f3576b7a26e0c34653492e8e112bc672830b94fb5acfa272" host="10.0.0.135" Jul 10 00:46:51.358621 env[1213]: 2025-07-10 00:46:51.336 [INFO][2545] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.36.130/26] handle="k8s-pod-network.abde914a43eff402f3576b7a26e0c34653492e8e112bc672830b94fb5acfa272" host="10.0.0.135" Jul 10 00:46:51.358621 env[1213]: 2025-07-10 00:46:51.336 [INFO][2545] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Jul 10 00:46:51.358621 env[1213]: 2025-07-10 00:46:51.336 [INFO][2545] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.36.130/26] IPv6=[] ContainerID="abde914a43eff402f3576b7a26e0c34653492e8e112bc672830b94fb5acfa272" HandleID="k8s-pod-network.abde914a43eff402f3576b7a26e0c34653492e8e112bc672830b94fb5acfa272" Workload="10.0.0.135-k8s-nfs--server--provisioner--0-eth0" Jul 10 00:46:51.359589 env[1213]: 2025-07-10 00:46:51.337 [INFO][2531] cni-plugin/k8s.go 418: Populated endpoint ContainerID="abde914a43eff402f3576b7a26e0c34653492e8e112bc672830b94fb5acfa272" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.135-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.135-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"27808bcc-70fb-48e9-a1d7-acb86c304187", ResourceVersion:"1297", Generation:0, CreationTimestamp:time.Date(2025, time.July, 10, 0, 46, 50, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "apps.kubernetes.io/pod-index":"0", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.135", ContainerID:"", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.36.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Jul 10 00:46:51.359589 env[1213]: 2025-07-10 00:46:51.338 [INFO][2531] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.36.130/32] ContainerID="abde914a43eff402f3576b7a26e0c34653492e8e112bc672830b94fb5acfa272" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.135-k8s-nfs--server--provisioner--0-eth0" Jul 10 00:46:51.359589 env[1213]: 2025-07-10 00:46:51.338 [INFO][2531] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali60e51b789ff ContainerID="abde914a43eff402f3576b7a26e0c34653492e8e112bc672830b94fb5acfa272" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.135-k8s-nfs--server--provisioner--0-eth0" Jul 10 00:46:51.359589 env[1213]: 2025-07-10 00:46:51.342 [INFO][2531] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="abde914a43eff402f3576b7a26e0c34653492e8e112bc672830b94fb5acfa272" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.135-k8s-nfs--server--provisioner--0-eth0" Jul 10 00:46:51.359738 env[1213]: 2025-07-10 00:46:51.345 [INFO][2531] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="abde914a43eff402f3576b7a26e0c34653492e8e112bc672830b94fb5acfa272" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.135-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.135-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"27808bcc-70fb-48e9-a1d7-acb86c304187", ResourceVersion:"1297", Generation:0, CreationTimestamp:time.Date(2025, time.July, 10, 0, 46, 50, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "apps.kubernetes.io/pod-index":"0", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.135", ContainerID:"abde914a43eff402f3576b7a26e0c34653492e8e112bc672830b94fb5acfa272", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.36.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"ee:d9:20:53:66:02", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Jul 10 00:46:51.359738 env[1213]: 2025-07-10 00:46:51.356 [INFO][2531] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="abde914a43eff402f3576b7a26e0c34653492e8e112bc672830b94fb5acfa272" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.135-k8s-nfs--server--provisioner--0-eth0" Jul 10 00:46:51.367000 audit[2563]: NETFILTER_CFG table=filter:85 family=2 entries=36 op=nft_register_chain pid=2563 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 10 00:46:51.368986 kernel: kauditd_printk_skb: 14 callbacks suppressed Jul 10 00:46:51.369127 kernel: audit: type=1325 audit(1752108411.367:696): table=filter:85 family=2 entries=36 op=nft_register_chain pid=2563 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 10 00:46:51.367000 audit[2563]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=19568 a0=3 a1=ffffc97b8360 a2=0 a3=ffffb2d26fa8 items=0 ppid=2215 pid=2563 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:46:51.374520 kernel: audit: type=1300 audit(1752108411.367:696): arch=c00000b7 syscall=211 success=yes exit=19568 a0=3 a1=ffffc97b8360 a2=0 a3=ffffb2d26fa8 items=0 ppid=2215 pid=2563 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:46:51.374591 kernel: audit: type=1327 audit(1752108411.367:696): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 10 00:46:51.367000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 10 00:46:51.390195 env[1213]: time="2025-07-10T00:46:51.390030113Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 10 00:46:51.390195 env[1213]: time="2025-07-10T00:46:51.390066927Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 10 00:46:51.390195 env[1213]: time="2025-07-10T00:46:51.390077119Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 10 00:46:51.390353 env[1213]: time="2025-07-10T00:46:51.390229890Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/abde914a43eff402f3576b7a26e0c34653492e8e112bc672830b94fb5acfa272 pid=2571 runtime=io.containerd.runc.v2 Jul 10 00:46:51.403997 systemd[1]: Started cri-containerd-abde914a43eff402f3576b7a26e0c34653492e8e112bc672830b94fb5acfa272.scope. Jul 10 00:46:51.437000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:51.448856 kernel: audit: type=1400 audit(1752108411.437:697): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:51.448966 kernel: audit: type=1400 audit(1752108411.437:698): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:51.448989 kernel: audit: type=1400 audit(1752108411.437:699): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:51.449008 kernel: audit: type=1400 audit(1752108411.437:700): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:51.449029 kernel: audit: type=1400 audit(1752108411.437:701): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:51.437000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:51.437000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:51.437000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:51.437000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:51.437000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:51.453150 kernel: audit: type=1400 audit(1752108411.437:702): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:51.453207 kernel: audit: type=1400 audit(1752108411.437:703): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:51.437000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:51.437000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:51.437000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:51.440000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:51.440000 audit: BPF prog-id=108 op=LOAD Jul 10 00:46:51.449000 audit[2582]: AVC avc: denied { bpf } for pid=2582 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:51.449000 audit[2582]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=2571 pid=2582 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:46:51.449000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6162646539313461343365666634303266333537366237613236653063 Jul 10 00:46:51.449000 audit[2582]: AVC avc: denied { perfmon } for pid=2582 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:51.449000 audit[2582]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2571 pid=2582 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:46:51.449000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6162646539313461343365666634303266333537366237613236653063 Jul 10 00:46:51.449000 audit[2582]: AVC avc: denied { bpf } for pid=2582 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:51.449000 audit[2582]: AVC avc: denied { bpf } for pid=2582 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:51.449000 audit[2582]: AVC avc: denied { bpf } for pid=2582 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:51.449000 audit[2582]: AVC avc: denied { perfmon } for pid=2582 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:51.449000 audit[2582]: AVC avc: denied { perfmon } for pid=2582 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:51.449000 audit[2582]: AVC avc: denied { perfmon } for pid=2582 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:51.449000 audit[2582]: AVC avc: denied { perfmon } for pid=2582 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:51.449000 audit[2582]: AVC avc: denied { perfmon } for pid=2582 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:51.449000 audit[2582]: AVC avc: denied { bpf } for pid=2582 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:51.449000 audit[2582]: AVC avc: denied { bpf } for pid=2582 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:51.449000 audit: BPF prog-id=109 op=LOAD Jul 10 00:46:51.449000 audit[2582]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=2571 pid=2582 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:46:51.449000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6162646539313461343365666634303266333537366237613236653063 Jul 10 00:46:51.450000 audit[2582]: AVC avc: denied { bpf } for pid=2582 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:51.450000 audit[2582]: AVC avc: denied { bpf } for pid=2582 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:51.450000 audit[2582]: AVC avc: denied { perfmon } for pid=2582 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:51.450000 audit[2582]: AVC avc: denied { perfmon } for pid=2582 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:51.450000 audit[2582]: AVC avc: denied { perfmon } for pid=2582 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:51.450000 audit[2582]: AVC avc: denied { perfmon } for pid=2582 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:51.450000 audit[2582]: AVC avc: denied { perfmon } for pid=2582 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:51.450000 audit[2582]: AVC avc: denied { bpf } for pid=2582 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:51.450000 audit[2582]: AVC avc: denied { bpf } for pid=2582 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:51.450000 audit: BPF prog-id=110 op=LOAD Jul 10 00:46:51.450000 audit[2582]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=2571 pid=2582 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:46:51.450000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6162646539313461343365666634303266333537366237613236653063 Jul 10 00:46:51.452000 audit: BPF prog-id=110 op=UNLOAD Jul 10 00:46:51.452000 audit: BPF prog-id=109 op=UNLOAD Jul 10 00:46:51.452000 audit[2582]: AVC avc: denied { bpf } for pid=2582 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:51.452000 audit[2582]: AVC avc: denied { bpf } for pid=2582 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:51.452000 audit[2582]: AVC avc: denied { bpf } for pid=2582 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:51.452000 audit[2582]: AVC avc: denied { perfmon } for pid=2582 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:51.452000 audit[2582]: AVC avc: denied { perfmon } for pid=2582 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:51.452000 audit[2582]: AVC avc: denied { perfmon } for pid=2582 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:51.452000 audit[2582]: AVC avc: denied { perfmon } for pid=2582 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:51.452000 audit[2582]: AVC avc: denied { perfmon } for pid=2582 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:51.452000 audit[2582]: AVC avc: denied { bpf } for pid=2582 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:51.452000 audit[2582]: AVC avc: denied { bpf } for pid=2582 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:51.452000 audit: BPF prog-id=111 op=LOAD Jul 10 00:46:51.452000 audit[2582]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=2571 pid=2582 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:46:51.452000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6162646539313461343365666634303266333537366237613236653063 Jul 10 00:46:51.456938 systemd-resolved[1154]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Jul 10 00:46:51.472347 env[1213]: time="2025-07-10T00:46:51.472300683Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:27808bcc-70fb-48e9-a1d7-acb86c304187,Namespace:default,Attempt:0,} returns sandbox id \"abde914a43eff402f3576b7a26e0c34653492e8e112bc672830b94fb5acfa272\"" Jul 10 00:46:51.473744 env[1213]: time="2025-07-10T00:46:51.473669623Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\"" Jul 10 00:46:51.929096 systemd[1]: run-containerd-runc-k8s.io-abde914a43eff402f3576b7a26e0c34653492e8e112bc672830b94fb5acfa272-runc.SqSlD1.mount: Deactivated successfully. Jul 10 00:46:52.084430 kubelet[1452]: E0710 00:46:52.084386 1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 00:46:52.258873 env[1213]: time="2025-07-10T00:46:52.258799287Z" level=info msg="StopPodSandbox for \"2d2cd167f9c6b9b991d7d79bcb3dafcd87891599405039ba1f4af331897876fd\"" Jul 10 00:46:52.365625 env[1213]: 2025-07-10 00:46:52.319 [INFO][2622] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="2d2cd167f9c6b9b991d7d79bcb3dafcd87891599405039ba1f4af331897876fd" Jul 10 00:46:52.365625 env[1213]: 2025-07-10 00:46:52.320 [INFO][2622] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="2d2cd167f9c6b9b991d7d79bcb3dafcd87891599405039ba1f4af331897876fd" iface="eth0" netns="/var/run/netns/cni-b2c51487-a280-9f6a-b4f8-69a070ca2e03" Jul 10 00:46:52.365625 env[1213]: 2025-07-10 00:46:52.320 [INFO][2622] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="2d2cd167f9c6b9b991d7d79bcb3dafcd87891599405039ba1f4af331897876fd" iface="eth0" netns="/var/run/netns/cni-b2c51487-a280-9f6a-b4f8-69a070ca2e03" Jul 10 00:46:52.365625 env[1213]: 2025-07-10 00:46:52.321 [INFO][2622] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="2d2cd167f9c6b9b991d7d79bcb3dafcd87891599405039ba1f4af331897876fd" iface="eth0" netns="/var/run/netns/cni-b2c51487-a280-9f6a-b4f8-69a070ca2e03" Jul 10 00:46:52.365625 env[1213]: 2025-07-10 00:46:52.321 [INFO][2622] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="2d2cd167f9c6b9b991d7d79bcb3dafcd87891599405039ba1f4af331897876fd" Jul 10 00:46:52.365625 env[1213]: 2025-07-10 00:46:52.321 [INFO][2622] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="2d2cd167f9c6b9b991d7d79bcb3dafcd87891599405039ba1f4af331897876fd" Jul 10 00:46:52.365625 env[1213]: 2025-07-10 00:46:52.343 [INFO][2631] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="2d2cd167f9c6b9b991d7d79bcb3dafcd87891599405039ba1f4af331897876fd" HandleID="k8s-pod-network.2d2cd167f9c6b9b991d7d79bcb3dafcd87891599405039ba1f4af331897876fd" Workload="10.0.0.135-k8s-csi--node--driver--dt2n5-eth0" Jul 10 00:46:52.365625 env[1213]: 2025-07-10 00:46:52.343 [INFO][2631] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Jul 10 00:46:52.365625 env[1213]: 2025-07-10 00:46:52.344 [INFO][2631] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Jul 10 00:46:52.365625 env[1213]: 2025-07-10 00:46:52.355 [WARNING][2631] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="2d2cd167f9c6b9b991d7d79bcb3dafcd87891599405039ba1f4af331897876fd" HandleID="k8s-pod-network.2d2cd167f9c6b9b991d7d79bcb3dafcd87891599405039ba1f4af331897876fd" Workload="10.0.0.135-k8s-csi--node--driver--dt2n5-eth0" Jul 10 00:46:52.365625 env[1213]: 2025-07-10 00:46:52.355 [INFO][2631] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="2d2cd167f9c6b9b991d7d79bcb3dafcd87891599405039ba1f4af331897876fd" HandleID="k8s-pod-network.2d2cd167f9c6b9b991d7d79bcb3dafcd87891599405039ba1f4af331897876fd" Workload="10.0.0.135-k8s-csi--node--driver--dt2n5-eth0" Jul 10 00:46:52.365625 env[1213]: 2025-07-10 00:46:52.358 [INFO][2631] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Jul 10 00:46:52.365625 env[1213]: 2025-07-10 00:46:52.361 [INFO][2622] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="2d2cd167f9c6b9b991d7d79bcb3dafcd87891599405039ba1f4af331897876fd" Jul 10 00:46:52.367190 systemd[1]: run-netns-cni\x2db2c51487\x2da280\x2d9f6a\x2db4f8\x2d69a070ca2e03.mount: Deactivated successfully. Jul 10 00:46:52.368211 env[1213]: time="2025-07-10T00:46:52.368160582Z" level=info msg="TearDown network for sandbox \"2d2cd167f9c6b9b991d7d79bcb3dafcd87891599405039ba1f4af331897876fd\" successfully" Jul 10 00:46:52.368211 env[1213]: time="2025-07-10T00:46:52.368206914Z" level=info msg="StopPodSandbox for \"2d2cd167f9c6b9b991d7d79bcb3dafcd87891599405039ba1f4af331897876fd\" returns successfully" Jul 10 00:46:52.368977 env[1213]: time="2025-07-10T00:46:52.368941587Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-dt2n5,Uid:fbc40611-2884-42cd-adda-c9271a71838c,Namespace:calico-system,Attempt:1,}" Jul 10 00:46:52.516108 systemd-networkd[1043]: cali7c06e2d9ca4: Link UP Jul 10 00:46:52.519522 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Jul 10 00:46:52.519619 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali7c06e2d9ca4: link becomes ready Jul 10 00:46:52.519705 systemd-networkd[1043]: cali7c06e2d9ca4: Gained carrier Jul 10 00:46:52.535175 env[1213]: 2025-07-10 00:46:52.446 [INFO][2638] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.0.0.135-k8s-csi--node--driver--dt2n5-eth0 csi-node-driver- calico-system fbc40611-2884-42cd-adda-c9271a71838c 1318 0 2025-07-10 00:46:27 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:8967bcb6f k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:csi-node-driver] map[] [] [] []} {k8s 10.0.0.135 csi-node-driver-dt2n5 eth0 csi-node-driver [] [] [kns.calico-system ksa.calico-system.csi-node-driver] cali7c06e2d9ca4 [] [] }} ContainerID="7f8036ae630137409dd65f9e5c7d83abf8f9c259bff388810c2f5c5c8095e35a" Namespace="calico-system" Pod="csi-node-driver-dt2n5" WorkloadEndpoint="10.0.0.135-k8s-csi--node--driver--dt2n5-" Jul 10 00:46:52.535175 env[1213]: 2025-07-10 00:46:52.446 [INFO][2638] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="7f8036ae630137409dd65f9e5c7d83abf8f9c259bff388810c2f5c5c8095e35a" Namespace="calico-system" Pod="csi-node-driver-dt2n5" WorkloadEndpoint="10.0.0.135-k8s-csi--node--driver--dt2n5-eth0" Jul 10 00:46:52.535175 env[1213]: 2025-07-10 00:46:52.471 [INFO][2653] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="7f8036ae630137409dd65f9e5c7d83abf8f9c259bff388810c2f5c5c8095e35a" HandleID="k8s-pod-network.7f8036ae630137409dd65f9e5c7d83abf8f9c259bff388810c2f5c5c8095e35a" Workload="10.0.0.135-k8s-csi--node--driver--dt2n5-eth0" Jul 10 00:46:52.535175 env[1213]: 2025-07-10 00:46:52.471 [INFO][2653] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="7f8036ae630137409dd65f9e5c7d83abf8f9c259bff388810c2f5c5c8095e35a" HandleID="k8s-pod-network.7f8036ae630137409dd65f9e5c7d83abf8f9c259bff388810c2f5c5c8095e35a" Workload="10.0.0.135-k8s-csi--node--driver--dt2n5-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x40005a8a60), Attrs:map[string]string{"namespace":"calico-system", "node":"10.0.0.135", "pod":"csi-node-driver-dt2n5", "timestamp":"2025-07-10 00:46:52.471357339 +0000 UTC"}, Hostname:"10.0.0.135", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Jul 10 00:46:52.535175 env[1213]: 2025-07-10 00:46:52.471 [INFO][2653] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Jul 10 00:46:52.535175 env[1213]: 2025-07-10 00:46:52.471 [INFO][2653] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Jul 10 00:46:52.535175 env[1213]: 2025-07-10 00:46:52.471 [INFO][2653] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.0.0.135' Jul 10 00:46:52.535175 env[1213]: 2025-07-10 00:46:52.485 [INFO][2653] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.7f8036ae630137409dd65f9e5c7d83abf8f9c259bff388810c2f5c5c8095e35a" host="10.0.0.135" Jul 10 00:46:52.535175 env[1213]: 2025-07-10 00:46:52.490 [INFO][2653] ipam/ipam.go 394: Looking up existing affinities for host host="10.0.0.135" Jul 10 00:46:52.535175 env[1213]: 2025-07-10 00:46:52.495 [INFO][2653] ipam/ipam.go 511: Trying affinity for 192.168.36.128/26 host="10.0.0.135" Jul 10 00:46:52.535175 env[1213]: 2025-07-10 00:46:52.497 [INFO][2653] ipam/ipam.go 158: Attempting to load block cidr=192.168.36.128/26 host="10.0.0.135" Jul 10 00:46:52.535175 env[1213]: 2025-07-10 00:46:52.499 [INFO][2653] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.36.128/26 host="10.0.0.135" Jul 10 00:46:52.535175 env[1213]: 2025-07-10 00:46:52.499 [INFO][2653] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.36.128/26 handle="k8s-pod-network.7f8036ae630137409dd65f9e5c7d83abf8f9c259bff388810c2f5c5c8095e35a" host="10.0.0.135" Jul 10 00:46:52.535175 env[1213]: 2025-07-10 00:46:52.501 [INFO][2653] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.7f8036ae630137409dd65f9e5c7d83abf8f9c259bff388810c2f5c5c8095e35a Jul 10 00:46:52.535175 env[1213]: 2025-07-10 00:46:52.505 [INFO][2653] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.36.128/26 handle="k8s-pod-network.7f8036ae630137409dd65f9e5c7d83abf8f9c259bff388810c2f5c5c8095e35a" host="10.0.0.135" Jul 10 00:46:52.535175 env[1213]: 2025-07-10 00:46:52.511 [INFO][2653] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.36.131/26] block=192.168.36.128/26 handle="k8s-pod-network.7f8036ae630137409dd65f9e5c7d83abf8f9c259bff388810c2f5c5c8095e35a" host="10.0.0.135" Jul 10 00:46:52.535175 env[1213]: 2025-07-10 00:46:52.511 [INFO][2653] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.36.131/26] handle="k8s-pod-network.7f8036ae630137409dd65f9e5c7d83abf8f9c259bff388810c2f5c5c8095e35a" host="10.0.0.135" Jul 10 00:46:52.535175 env[1213]: 2025-07-10 00:46:52.511 [INFO][2653] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Jul 10 00:46:52.535175 env[1213]: 2025-07-10 00:46:52.511 [INFO][2653] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.36.131/26] IPv6=[] ContainerID="7f8036ae630137409dd65f9e5c7d83abf8f9c259bff388810c2f5c5c8095e35a" HandleID="k8s-pod-network.7f8036ae630137409dd65f9e5c7d83abf8f9c259bff388810c2f5c5c8095e35a" Workload="10.0.0.135-k8s-csi--node--driver--dt2n5-eth0" Jul 10 00:46:52.535791 env[1213]: 2025-07-10 00:46:52.513 [INFO][2638] cni-plugin/k8s.go 418: Populated endpoint ContainerID="7f8036ae630137409dd65f9e5c7d83abf8f9c259bff388810c2f5c5c8095e35a" Namespace="calico-system" Pod="csi-node-driver-dt2n5" WorkloadEndpoint="10.0.0.135-k8s-csi--node--driver--dt2n5-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.135-k8s-csi--node--driver--dt2n5-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"fbc40611-2884-42cd-adda-c9271a71838c", ResourceVersion:"1318", Generation:0, CreationTimestamp:time.Date(2025, time.July, 10, 0, 46, 27, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"8967bcb6f", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.135", ContainerID:"", Pod:"csi-node-driver-dt2n5", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.36.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali7c06e2d9ca4", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Jul 10 00:46:52.535791 env[1213]: 2025-07-10 00:46:52.513 [INFO][2638] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.36.131/32] ContainerID="7f8036ae630137409dd65f9e5c7d83abf8f9c259bff388810c2f5c5c8095e35a" Namespace="calico-system" Pod="csi-node-driver-dt2n5" WorkloadEndpoint="10.0.0.135-k8s-csi--node--driver--dt2n5-eth0" Jul 10 00:46:52.535791 env[1213]: 2025-07-10 00:46:52.513 [INFO][2638] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali7c06e2d9ca4 ContainerID="7f8036ae630137409dd65f9e5c7d83abf8f9c259bff388810c2f5c5c8095e35a" Namespace="calico-system" Pod="csi-node-driver-dt2n5" WorkloadEndpoint="10.0.0.135-k8s-csi--node--driver--dt2n5-eth0" Jul 10 00:46:52.535791 env[1213]: 2025-07-10 00:46:52.520 [INFO][2638] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="7f8036ae630137409dd65f9e5c7d83abf8f9c259bff388810c2f5c5c8095e35a" Namespace="calico-system" Pod="csi-node-driver-dt2n5" WorkloadEndpoint="10.0.0.135-k8s-csi--node--driver--dt2n5-eth0" Jul 10 00:46:52.535791 env[1213]: 2025-07-10 00:46:52.522 [INFO][2638] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="7f8036ae630137409dd65f9e5c7d83abf8f9c259bff388810c2f5c5c8095e35a" Namespace="calico-system" Pod="csi-node-driver-dt2n5" WorkloadEndpoint="10.0.0.135-k8s-csi--node--driver--dt2n5-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.135-k8s-csi--node--driver--dt2n5-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"fbc40611-2884-42cd-adda-c9271a71838c", ResourceVersion:"1318", Generation:0, CreationTimestamp:time.Date(2025, time.July, 10, 0, 46, 27, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"8967bcb6f", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.135", ContainerID:"7f8036ae630137409dd65f9e5c7d83abf8f9c259bff388810c2f5c5c8095e35a", Pod:"csi-node-driver-dt2n5", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.36.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali7c06e2d9ca4", MAC:"ca:50:80:cd:b3:94", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Jul 10 00:46:52.535791 env[1213]: 2025-07-10 00:46:52.531 [INFO][2638] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="7f8036ae630137409dd65f9e5c7d83abf8f9c259bff388810c2f5c5c8095e35a" Namespace="calico-system" Pod="csi-node-driver-dt2n5" WorkloadEndpoint="10.0.0.135-k8s-csi--node--driver--dt2n5-eth0" Jul 10 00:46:52.542000 audit[2675]: NETFILTER_CFG table=filter:86 family=2 entries=46 op=nft_register_chain pid=2675 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 10 00:46:52.542000 audit[2675]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=23740 a0=3 a1=ffffc25e0ef0 a2=0 a3=ffff8b84afa8 items=0 ppid=2215 pid=2675 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:46:52.542000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 10 00:46:52.548097 env[1213]: time="2025-07-10T00:46:52.548019454Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 10 00:46:52.548097 env[1213]: time="2025-07-10T00:46:52.548074348Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 10 00:46:52.548097 env[1213]: time="2025-07-10T00:46:52.548085631Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 10 00:46:52.548291 env[1213]: time="2025-07-10T00:46:52.548251515Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/7f8036ae630137409dd65f9e5c7d83abf8f9c259bff388810c2f5c5c8095e35a pid=2679 runtime=io.containerd.runc.v2 Jul 10 00:46:52.561420 systemd[1]: Started cri-containerd-7f8036ae630137409dd65f9e5c7d83abf8f9c259bff388810c2f5c5c8095e35a.scope. Jul 10 00:46:52.566578 systemd-networkd[1043]: cali60e51b789ff: Gained IPv6LL Jul 10 00:46:52.599000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:52.599000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:52.599000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:52.599000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:52.599000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:52.599000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:52.599000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:52.599000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:52.599000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:52.599000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:52.599000 audit: BPF prog-id=112 op=LOAD Jul 10 00:46:52.599000 audit[2688]: AVC avc: denied { bpf } for pid=2688 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:52.599000 audit[2688]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=2679 pid=2688 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:46:52.599000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3766383033366165363330313337343039646436356639653563376438 Jul 10 00:46:52.600000 audit[2688]: AVC avc: denied { perfmon } for pid=2688 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:52.600000 audit[2688]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2679 pid=2688 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:46:52.600000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3766383033366165363330313337343039646436356639653563376438 Jul 10 00:46:52.600000 audit[2688]: AVC avc: denied { bpf } for pid=2688 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:52.600000 audit[2688]: AVC avc: denied { bpf } for pid=2688 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:52.600000 audit[2688]: AVC avc: denied { bpf } for pid=2688 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:52.600000 audit[2688]: AVC avc: denied { perfmon } for pid=2688 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:52.600000 audit[2688]: AVC avc: denied { perfmon } for pid=2688 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:52.600000 audit[2688]: AVC avc: denied { perfmon } for pid=2688 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:52.600000 audit[2688]: AVC avc: denied { perfmon } for pid=2688 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:52.600000 audit[2688]: AVC avc: denied { perfmon } for pid=2688 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:52.600000 audit[2688]: AVC avc: denied { bpf } for pid=2688 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:52.600000 audit[2688]: AVC avc: denied { bpf } for pid=2688 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:52.600000 audit: BPF prog-id=113 op=LOAD Jul 10 00:46:52.600000 audit[2688]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2679 pid=2688 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:46:52.600000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3766383033366165363330313337343039646436356639653563376438 Jul 10 00:46:52.600000 audit[2688]: AVC avc: denied { bpf } for pid=2688 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:52.600000 audit[2688]: AVC avc: denied { bpf } for pid=2688 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:52.600000 audit[2688]: AVC avc: denied { perfmon } for pid=2688 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:52.600000 audit[2688]: AVC avc: denied { perfmon } for pid=2688 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:52.600000 audit[2688]: AVC avc: denied { perfmon } for pid=2688 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:52.600000 audit[2688]: AVC avc: denied { perfmon } for pid=2688 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:52.600000 audit[2688]: AVC avc: denied { perfmon } for pid=2688 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:52.600000 audit[2688]: AVC avc: denied { bpf } for pid=2688 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:52.600000 audit[2688]: AVC avc: denied { bpf } for pid=2688 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:52.600000 audit: BPF prog-id=114 op=LOAD Jul 10 00:46:52.600000 audit[2688]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2679 pid=2688 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:46:52.600000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3766383033366165363330313337343039646436356639653563376438 Jul 10 00:46:52.600000 audit: BPF prog-id=114 op=UNLOAD Jul 10 00:46:52.600000 audit: BPF prog-id=113 op=UNLOAD Jul 10 00:46:52.600000 audit[2688]: AVC avc: denied { bpf } for pid=2688 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:52.600000 audit[2688]: AVC avc: denied { bpf } for pid=2688 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:52.600000 audit[2688]: AVC avc: denied { bpf } for pid=2688 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:52.600000 audit[2688]: AVC avc: denied { perfmon } for pid=2688 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:52.600000 audit[2688]: AVC avc: denied { perfmon } for pid=2688 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:52.600000 audit[2688]: AVC avc: denied { perfmon } for pid=2688 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:52.600000 audit[2688]: AVC avc: denied { perfmon } for pid=2688 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:52.600000 audit[2688]: AVC avc: denied { perfmon } for pid=2688 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:52.600000 audit[2688]: AVC avc: denied { bpf } for pid=2688 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:52.600000 audit[2688]: AVC avc: denied { bpf } for pid=2688 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:52.600000 audit: BPF prog-id=115 op=LOAD Jul 10 00:46:52.600000 audit[2688]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2679 pid=2688 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:46:52.600000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3766383033366165363330313337343039646436356639653563376438 Jul 10 00:46:52.604056 systemd-resolved[1154]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Jul 10 00:46:52.615745 env[1213]: time="2025-07-10T00:46:52.615709295Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-dt2n5,Uid:fbc40611-2884-42cd-adda-c9271a71838c,Namespace:calico-system,Attempt:1,} returns sandbox id \"7f8036ae630137409dd65f9e5c7d83abf8f9c259bff388810c2f5c5c8095e35a\"" Jul 10 00:46:53.085469 kubelet[1452]: E0710 00:46:53.085421 1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 00:46:53.567066 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3550386965.mount: Deactivated successfully. Jul 10 00:46:54.086104 kubelet[1452]: E0710 00:46:54.086051 1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 00:46:54.418656 systemd-networkd[1043]: cali7c06e2d9ca4: Gained IPv6LL Jul 10 00:46:55.086383 kubelet[1452]: E0710 00:46:55.086333 1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 00:46:55.347868 env[1213]: time="2025-07-10T00:46:55.347766776Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 10 00:46:55.349276 env[1213]: time="2025-07-10T00:46:55.349246423Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:5a42a519e0a8cf95c3c5f18f767c58c8c8b072aaea0a26e5e47a6f206c7df685,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 10 00:46:55.351896 env[1213]: time="2025-07-10T00:46:55.351861282Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 10 00:46:55.353786 env[1213]: time="2025-07-10T00:46:55.353760582Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 10 00:46:55.354400 env[1213]: time="2025-07-10T00:46:55.354355554Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\" returns image reference \"sha256:5a42a519e0a8cf95c3c5f18f767c58c8c8b072aaea0a26e5e47a6f206c7df685\"" Jul 10 00:46:55.356154 env[1213]: time="2025-07-10T00:46:55.355817038Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.30.2\"" Jul 10 00:46:55.358700 env[1213]: time="2025-07-10T00:46:55.358651705Z" level=info msg="CreateContainer within sandbox \"abde914a43eff402f3576b7a26e0c34653492e8e112bc672830b94fb5acfa272\" for container &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,}" Jul 10 00:46:55.370388 env[1213]: time="2025-07-10T00:46:55.370337332Z" level=info msg="CreateContainer within sandbox \"abde914a43eff402f3576b7a26e0c34653492e8e112bc672830b94fb5acfa272\" for &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,} returns container id \"750b952a14ec742e1d97ac4fd0c36cc5553b230bc34dd7d1bc40cbbc3dcaecf2\"" Jul 10 00:46:55.371116 env[1213]: time="2025-07-10T00:46:55.371089458Z" level=info msg="StartContainer for \"750b952a14ec742e1d97ac4fd0c36cc5553b230bc34dd7d1bc40cbbc3dcaecf2\"" Jul 10 00:46:55.388811 systemd[1]: Started cri-containerd-750b952a14ec742e1d97ac4fd0c36cc5553b230bc34dd7d1bc40cbbc3dcaecf2.scope. Jul 10 00:46:55.424000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:55.424000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:55.424000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:55.424000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:55.424000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:55.424000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:55.424000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:55.424000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:55.424000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:55.424000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:55.424000 audit: BPF prog-id=116 op=LOAD Jul 10 00:46:55.425000 audit[2720]: AVC avc: denied { bpf } for pid=2720 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:55.425000 audit[2720]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=2571 pid=2720 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:46:55.425000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3735306239353261313465633734326531643937616334666430633336 Jul 10 00:46:55.425000 audit[2720]: AVC avc: denied { perfmon } for pid=2720 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:55.425000 audit[2720]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2571 pid=2720 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:46:55.425000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3735306239353261313465633734326531643937616334666430633336 Jul 10 00:46:55.425000 audit[2720]: AVC avc: denied { bpf } for pid=2720 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:55.425000 audit[2720]: AVC avc: denied { bpf } for pid=2720 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:55.425000 audit[2720]: AVC avc: denied { bpf } for pid=2720 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:55.425000 audit[2720]: AVC avc: denied { perfmon } for pid=2720 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:55.425000 audit[2720]: AVC avc: denied { perfmon } for pid=2720 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:55.425000 audit[2720]: AVC avc: denied { perfmon } for pid=2720 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:55.425000 audit[2720]: AVC avc: denied { perfmon } for pid=2720 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:55.425000 audit[2720]: AVC avc: denied { perfmon } for pid=2720 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:55.425000 audit[2720]: AVC avc: denied { bpf } for pid=2720 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:55.425000 audit[2720]: AVC avc: denied { bpf } for pid=2720 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:55.425000 audit: BPF prog-id=117 op=LOAD Jul 10 00:46:55.425000 audit[2720]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2571 pid=2720 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:46:55.425000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3735306239353261313465633734326531643937616334666430633336 Jul 10 00:46:55.425000 audit[2720]: AVC avc: denied { bpf } for pid=2720 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:55.425000 audit[2720]: AVC avc: denied { bpf } for pid=2720 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:55.425000 audit[2720]: AVC avc: denied { perfmon } for pid=2720 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:55.425000 audit[2720]: AVC avc: denied { perfmon } for pid=2720 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:55.425000 audit[2720]: AVC avc: denied { perfmon } for pid=2720 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:55.425000 audit[2720]: AVC avc: denied { perfmon } for pid=2720 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:55.425000 audit[2720]: AVC avc: denied { perfmon } for pid=2720 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:55.425000 audit[2720]: AVC avc: denied { bpf } for pid=2720 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:55.425000 audit[2720]: AVC avc: denied { bpf } for pid=2720 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:55.425000 audit: BPF prog-id=118 op=LOAD Jul 10 00:46:55.425000 audit[2720]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2571 pid=2720 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:46:55.425000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3735306239353261313465633734326531643937616334666430633336 Jul 10 00:46:55.425000 audit: BPF prog-id=118 op=UNLOAD Jul 10 00:46:55.425000 audit: BPF prog-id=117 op=UNLOAD Jul 10 00:46:55.425000 audit[2720]: AVC avc: denied { bpf } for pid=2720 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:55.425000 audit[2720]: AVC avc: denied { bpf } for pid=2720 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:55.425000 audit[2720]: AVC avc: denied { bpf } for pid=2720 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:55.425000 audit[2720]: AVC avc: denied { perfmon } for pid=2720 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:55.425000 audit[2720]: AVC avc: denied { perfmon } for pid=2720 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:55.425000 audit[2720]: AVC avc: denied { perfmon } for pid=2720 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:55.425000 audit[2720]: AVC avc: denied { perfmon } for pid=2720 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:55.425000 audit[2720]: AVC avc: denied { perfmon } for pid=2720 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:55.425000 audit[2720]: AVC avc: denied { bpf } for pid=2720 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:55.425000 audit[2720]: AVC avc: denied { bpf } for pid=2720 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:55.425000 audit: BPF prog-id=119 op=LOAD Jul 10 00:46:55.425000 audit[2720]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2571 pid=2720 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:46:55.425000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3735306239353261313465633734326531643937616334666430633336 Jul 10 00:46:55.440607 env[1213]: time="2025-07-10T00:46:55.440559915Z" level=info msg="StartContainer for \"750b952a14ec742e1d97ac4fd0c36cc5553b230bc34dd7d1bc40cbbc3dcaecf2\" returns successfully" Jul 10 00:46:55.561000 audit[2749]: AVC avc: denied { search } for pid=2749 comm="rpcbind" name="crypto" dev="proc" ino=15330 scontext=system_u:system_r:svirt_lxc_net_t:s0:c502,c1013 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Jul 10 00:46:55.561000 audit[2749]: SYSCALL arch=c00000b7 syscall=56 success=no exit=-13 a0=ffffffffffffff9c a1=ffffab8ff000 a2=0 a3=0 items=0 ppid=2731 pid=2749 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="rpcbind" exe="/usr/bin/rpcbind" subj=system_u:system_r:svirt_lxc_net_t:s0:c502,c1013 key=(null) Jul 10 00:46:55.561000 audit: PROCTITLE proctitle=2F7573722F7362696E2F72706362696E64002D77 Jul 10 00:46:55.600000 audit[2754]: AVC avc: denied { search } for pid=2754 comm="dbus-daemon" name="crypto" dev="proc" ino=15330 scontext=system_u:system_r:svirt_lxc_net_t:s0:c502,c1013 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Jul 10 00:46:55.600000 audit[2754]: SYSCALL arch=c00000b7 syscall=56 success=no exit=-13 a0=ffffffffffffff9c a1=ffffb3b6f000 a2=0 a3=0 items=0 ppid=2731 pid=2754 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c502,c1013 key=(null) Jul 10 00:46:55.600000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65 Jul 10 00:46:55.612000 audit[2755]: AVC avc: denied { watch } for pid=2755 comm="dbus-daemon" path="/usr/share/dbus-1/system.d" dev="overlay" ino=537578 scontext=system_u:system_r:svirt_lxc_net_t:s0:c502,c1013 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c502,c1013 tclass=dir permissive=0 Jul 10 00:46:55.612000 audit[2755]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6 a1=aaab24ed5580 a2=2c8 a3=aaab24ec3a60 items=0 ppid=2731 pid=2755 auid=4294967295 uid=81 gid=81 euid=81 suid=81 fsuid=81 egid=81 sgid=81 fsgid=81 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c502,c1013 key=(null) Jul 10 00:46:55.612000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65 Jul 10 00:46:55.619000 audit[2756]: AVC avc: denied { read } for pid=2756 comm="ganesha.nfsd" name="overcommit_memory" dev="proc" ino=17000 scontext=system_u:system_r:svirt_lxc_net_t:s0:c502,c1013 tcontext=system_u:object_r:sysctl_vm_overcommit_t:s0 tclass=file permissive=0 Jul 10 00:46:55.619000 audit[2756]: SYSCALL arch=c00000b7 syscall=56 success=no exit=-13 a0=ffffff9c a1=ffff9b93a570 a2=80000 a3=0 items=0 ppid=2731 pid=2756 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c502,c1013 key=(null) Jul 10 00:46:55.619000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66 Jul 10 00:46:55.620000 audit[2756]: AVC avc: denied { search } for pid=2756 comm="ganesha.nfsd" name="crypto" dev="proc" ino=15330 scontext=system_u:system_r:svirt_lxc_net_t:s0:c502,c1013 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Jul 10 00:46:55.620000 audit[2756]: SYSCALL arch=c00000b7 syscall=56 success=no exit=-13 a0=ffffffffffffff9c a1=ffff9accf000 a2=0 a3=0 items=0 ppid=2731 pid=2756 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c502,c1013 key=(null) Jul 10 00:46:55.620000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66 Jul 10 00:46:56.086810 kubelet[1452]: E0710 00:46:56.086763 1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 00:46:56.303316 env[1213]: time="2025-07-10T00:46:56.303268482Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.30.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 10 00:46:56.304875 env[1213]: time="2025-07-10T00:46:56.304839931Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:14ecfabbdbebd1f5a36708f8b11a95a43baddd6a935d7d78c89a9c333849fcd2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 10 00:46:56.306256 env[1213]: time="2025-07-10T00:46:56.306230222Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.30.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 10 00:46:56.308075 env[1213]: time="2025-07-10T00:46:56.308044682Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:e570128aa8067a2f06b96d3cc98afa2e0a4b9790b435ee36ca051c8e72aeb8d0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 10 00:46:56.308653 env[1213]: time="2025-07-10T00:46:56.308627604Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.30.2\" returns image reference \"sha256:14ecfabbdbebd1f5a36708f8b11a95a43baddd6a935d7d78c89a9c333849fcd2\"" Jul 10 00:46:56.313121 env[1213]: time="2025-07-10T00:46:56.313070774Z" level=info msg="CreateContainer within sandbox \"7f8036ae630137409dd65f9e5c7d83abf8f9c259bff388810c2f5c5c8095e35a\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" Jul 10 00:46:56.327534 env[1213]: time="2025-07-10T00:46:56.327472628Z" level=info msg="CreateContainer within sandbox \"7f8036ae630137409dd65f9e5c7d83abf8f9c259bff388810c2f5c5c8095e35a\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"463256f7250ba022c4efed089b5dc157b29183ad9b33ff8d347ffd89f26280fb\"" Jul 10 00:46:56.327974 env[1213]: time="2025-07-10T00:46:56.327916601Z" level=info msg="StartContainer for \"463256f7250ba022c4efed089b5dc157b29183ad9b33ff8d347ffd89f26280fb\"" Jul 10 00:46:56.343232 systemd[1]: Started cri-containerd-463256f7250ba022c4efed089b5dc157b29183ad9b33ff8d347ffd89f26280fb.scope. Jul 10 00:46:56.348506 kubelet[1452]: I0710 00:46:56.346779 1452 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="default/nfs-server-provisioner-0" podStartSLOduration=2.464524691 podStartE2EDuration="6.346764627s" podCreationTimestamp="2025-07-10 00:46:50 +0000 UTC" firstStartedPulling="2025-07-10 00:46:51.473428989 +0000 UTC m=+25.168534026" lastFinishedPulling="2025-07-10 00:46:55.355668925 +0000 UTC m=+29.050773962" observedRunningTime="2025-07-10 00:46:56.346519736 +0000 UTC m=+30.041624773" watchObservedRunningTime="2025-07-10 00:46:56.346764627 +0000 UTC m=+30.041869664" Jul 10 00:46:56.352000 audit[2793]: NETFILTER_CFG table=filter:87 family=2 entries=20 op=nft_register_rule pid=2793 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 10 00:46:56.352000 audit[2793]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3016 a0=3 a1=ffffd0e0ddc0 a2=0 a3=1 items=0 ppid=1614 pid=2793 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:46:56.352000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 10 00:46:56.366997 systemd[1]: run-containerd-runc-k8s.io-750b952a14ec742e1d97ac4fd0c36cc5553b230bc34dd7d1bc40cbbc3dcaecf2-runc.asBPZB.mount: Deactivated successfully. Jul 10 00:46:56.371099 kernel: kauditd_printk_skb: 185 callbacks suppressed Jul 10 00:46:56.371200 kernel: audit: type=1325 audit(1752108416.367:758): table=nat:88 family=2 entries=110 op=nft_register_chain pid=2793 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 10 00:46:56.367000 audit[2793]: NETFILTER_CFG table=nat:88 family=2 entries=110 op=nft_register_chain pid=2793 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 10 00:46:56.367000 audit[2793]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=50988 a0=3 a1=ffffd0e0ddc0 a2=0 a3=1 items=0 ppid=1614 pid=2793 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:46:56.376748 kernel: audit: type=1300 audit(1752108416.367:758): arch=c00000b7 syscall=211 success=yes exit=50988 a0=3 a1=ffffd0e0ddc0 a2=0 a3=1 items=0 ppid=1614 pid=2793 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:46:56.376838 kernel: audit: type=1327 audit(1752108416.367:758): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 10 00:46:56.367000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 10 00:46:56.378000 audit[2780]: AVC avc: denied { perfmon } for pid=2780 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:56.378000 audit[2780]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2679 pid=2780 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:46:56.386414 kernel: audit: type=1400 audit(1752108416.378:759): avc: denied { perfmon } for pid=2780 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:56.386472 kernel: audit: type=1300 audit(1752108416.378:759): arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2679 pid=2780 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:46:56.378000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3436333235366637323530626130323263346566656430383962356463 Jul 10 00:46:56.392109 kernel: audit: type=1327 audit(1752108416.378:759): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3436333235366637323530626130323263346566656430383962356463 Jul 10 00:46:56.379000 audit[2780]: AVC avc: denied { bpf } for pid=2780 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:56.395298 kernel: audit: type=1400 audit(1752108416.379:760): avc: denied { bpf } for pid=2780 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:56.379000 audit[2780]: AVC avc: denied { bpf } for pid=2780 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:56.397787 kernel: audit: type=1400 audit(1752108416.379:760): avc: denied { bpf } for pid=2780 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:56.397859 kernel: audit: type=1400 audit(1752108416.379:760): avc: denied { bpf } for pid=2780 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:56.379000 audit[2780]: AVC avc: denied { bpf } for pid=2780 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:56.379000 audit[2780]: AVC avc: denied { perfmon } for pid=2780 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:56.402696 kernel: audit: type=1400 audit(1752108416.379:760): avc: denied { perfmon } for pid=2780 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:56.379000 audit[2780]: AVC avc: denied { perfmon } for pid=2780 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:56.379000 audit[2780]: AVC avc: denied { perfmon } for pid=2780 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:56.379000 audit[2780]: AVC avc: denied { perfmon } for pid=2780 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:56.379000 audit[2780]: AVC avc: denied { perfmon } for pid=2780 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:56.379000 audit[2780]: AVC avc: denied { bpf } for pid=2780 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:56.379000 audit[2780]: AVC avc: denied { bpf } for pid=2780 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:56.379000 audit: BPF prog-id=120 op=LOAD Jul 10 00:46:56.379000 audit[2780]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=2679 pid=2780 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:46:56.379000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3436333235366637323530626130323263346566656430383962356463 Jul 10 00:46:56.381000 audit[2780]: AVC avc: denied { bpf } for pid=2780 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:56.381000 audit[2780]: AVC avc: denied { bpf } for pid=2780 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:56.381000 audit[2780]: AVC avc: denied { perfmon } for pid=2780 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:56.381000 audit[2780]: AVC avc: denied { perfmon } for pid=2780 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:56.381000 audit[2780]: AVC avc: denied { perfmon } for pid=2780 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:56.381000 audit[2780]: AVC avc: denied { perfmon } for pid=2780 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:56.381000 audit[2780]: AVC avc: denied { perfmon } for pid=2780 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:56.381000 audit[2780]: AVC avc: denied { bpf } for pid=2780 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:56.381000 audit[2780]: AVC avc: denied { bpf } for pid=2780 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:56.381000 audit: BPF prog-id=121 op=LOAD Jul 10 00:46:56.381000 audit[2780]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=2679 pid=2780 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:46:56.381000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3436333235366637323530626130323263346566656430383962356463 Jul 10 00:46:56.384000 audit: BPF prog-id=121 op=UNLOAD Jul 10 00:46:56.385000 audit: BPF prog-id=120 op=UNLOAD Jul 10 00:46:56.385000 audit[2780]: AVC avc: denied { bpf } for pid=2780 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:56.385000 audit[2780]: AVC avc: denied { bpf } for pid=2780 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:56.385000 audit[2780]: AVC avc: denied { bpf } for pid=2780 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:56.385000 audit[2780]: AVC avc: denied { perfmon } for pid=2780 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:56.385000 audit[2780]: AVC avc: denied { perfmon } for pid=2780 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:56.385000 audit[2780]: AVC avc: denied { perfmon } for pid=2780 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:56.385000 audit[2780]: AVC avc: denied { perfmon } for pid=2780 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:56.385000 audit[2780]: AVC avc: denied { perfmon } for pid=2780 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:56.385000 audit[2780]: AVC avc: denied { bpf } for pid=2780 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:56.385000 audit[2780]: AVC avc: denied { bpf } for pid=2780 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:56.385000 audit: BPF prog-id=122 op=LOAD Jul 10 00:46:56.385000 audit[2780]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=2679 pid=2780 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:46:56.385000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3436333235366637323530626130323263346566656430383962356463 Jul 10 00:46:56.405643 env[1213]: time="2025-07-10T00:46:56.404742043Z" level=info msg="StartContainer for \"463256f7250ba022c4efed089b5dc157b29183ad9b33ff8d347ffd89f26280fb\" returns successfully" Jul 10 00:46:56.407355 env[1213]: time="2025-07-10T00:46:56.407327104Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.2\"" Jul 10 00:46:57.087654 kubelet[1452]: E0710 00:46:57.087605 1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 00:46:57.517380 env[1213]: time="2025-07-10T00:46:57.517322616Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.30.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 10 00:46:57.518704 env[1213]: time="2025-07-10T00:46:57.518676804Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:664ed31fb4687b0de23d6e6e116bc87b236790d7355871d3237c54452e02e27c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 10 00:46:57.520146 env[1213]: time="2025-07-10T00:46:57.520108608Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.30.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 10 00:46:57.521536 env[1213]: time="2025-07-10T00:46:57.521491562Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:8fec2de12dfa51bae89d941938a07af2598eb8bfcab55d0dded1d9c193d7b99f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 10 00:46:57.521980 env[1213]: time="2025-07-10T00:46:57.521940131Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.2\" returns image reference \"sha256:664ed31fb4687b0de23d6e6e116bc87b236790d7355871d3237c54452e02e27c\"" Jul 10 00:46:57.525639 env[1213]: time="2025-07-10T00:46:57.525596415Z" level=info msg="CreateContainer within sandbox \"7f8036ae630137409dd65f9e5c7d83abf8f9c259bff388810c2f5c5c8095e35a\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" Jul 10 00:46:57.536708 env[1213]: time="2025-07-10T00:46:57.536676209Z" level=info msg="CreateContainer within sandbox \"7f8036ae630137409dd65f9e5c7d83abf8f9c259bff388810c2f5c5c8095e35a\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"8badcb3fe1c5dcbd01212d9835d82ecf716b3b7276b4ad61c87f6c7e0a365f5a\"" Jul 10 00:46:57.537211 env[1213]: time="2025-07-10T00:46:57.537181789Z" level=info msg="StartContainer for \"8badcb3fe1c5dcbd01212d9835d82ecf716b3b7276b4ad61c87f6c7e0a365f5a\"" Jul 10 00:46:57.561160 systemd[1]: run-containerd-runc-k8s.io-8badcb3fe1c5dcbd01212d9835d82ecf716b3b7276b4ad61c87f6c7e0a365f5a-runc.NY6qfx.mount: Deactivated successfully. Jul 10 00:46:57.565622 systemd[1]: Started cri-containerd-8badcb3fe1c5dcbd01212d9835d82ecf716b3b7276b4ad61c87f6c7e0a365f5a.scope. Jul 10 00:46:57.607000 audit[2817]: AVC avc: denied { perfmon } for pid=2817 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:57.607000 audit[2817]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2679 pid=2817 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:46:57.607000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3862616463623366653163356463626430313231326439383335643832 Jul 10 00:46:57.608000 audit[2817]: AVC avc: denied { bpf } for pid=2817 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:57.608000 audit[2817]: AVC avc: denied { bpf } for pid=2817 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:57.608000 audit[2817]: AVC avc: denied { bpf } for pid=2817 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:57.608000 audit[2817]: AVC avc: denied { perfmon } for pid=2817 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:57.608000 audit[2817]: AVC avc: denied { perfmon } for pid=2817 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:57.608000 audit[2817]: AVC avc: denied { perfmon } for pid=2817 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:57.608000 audit[2817]: AVC avc: denied { perfmon } for pid=2817 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:57.608000 audit[2817]: AVC avc: denied { perfmon } for pid=2817 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:57.608000 audit[2817]: AVC avc: denied { bpf } for pid=2817 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:57.608000 audit[2817]: AVC avc: denied { bpf } for pid=2817 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:57.608000 audit: BPF prog-id=123 op=LOAD Jul 10 00:46:57.608000 audit[2817]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2679 pid=2817 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:46:57.608000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3862616463623366653163356463626430313231326439383335643832 Jul 10 00:46:57.608000 audit[2817]: AVC avc: denied { bpf } for pid=2817 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:57.608000 audit[2817]: AVC avc: denied { bpf } for pid=2817 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:57.608000 audit[2817]: AVC avc: denied { perfmon } for pid=2817 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:57.608000 audit[2817]: AVC avc: denied { perfmon } for pid=2817 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:57.608000 audit[2817]: AVC avc: denied { perfmon } for pid=2817 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:57.608000 audit[2817]: AVC avc: denied { perfmon } for pid=2817 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:57.608000 audit[2817]: AVC avc: denied { perfmon } for pid=2817 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:57.608000 audit[2817]: AVC avc: denied { bpf } for pid=2817 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:57.608000 audit[2817]: AVC avc: denied { bpf } for pid=2817 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:57.608000 audit: BPF prog-id=124 op=LOAD Jul 10 00:46:57.608000 audit[2817]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2679 pid=2817 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:46:57.608000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3862616463623366653163356463626430313231326439383335643832 Jul 10 00:46:57.609000 audit: BPF prog-id=124 op=UNLOAD Jul 10 00:46:57.609000 audit: BPF prog-id=123 op=UNLOAD Jul 10 00:46:57.609000 audit[2817]: AVC avc: denied { bpf } for pid=2817 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:57.609000 audit[2817]: AVC avc: denied { bpf } for pid=2817 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:57.609000 audit[2817]: AVC avc: denied { bpf } for pid=2817 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:57.609000 audit[2817]: AVC avc: denied { perfmon } for pid=2817 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:57.609000 audit[2817]: AVC avc: denied { perfmon } for pid=2817 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:57.609000 audit[2817]: AVC avc: denied { perfmon } for pid=2817 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:57.609000 audit[2817]: AVC avc: denied { perfmon } for pid=2817 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:57.609000 audit[2817]: AVC avc: denied { perfmon } for pid=2817 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:57.609000 audit[2817]: AVC avc: denied { bpf } for pid=2817 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:57.609000 audit[2817]: AVC avc: denied { bpf } for pid=2817 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:46:57.609000 audit: BPF prog-id=125 op=LOAD Jul 10 00:46:57.609000 audit[2817]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2679 pid=2817 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:46:57.609000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3862616463623366653163356463626430313231326439383335643832 Jul 10 00:46:57.628471 env[1213]: time="2025-07-10T00:46:57.628430863Z" level=info msg="StartContainer for \"8badcb3fe1c5dcbd01212d9835d82ecf716b3b7276b4ad61c87f6c7e0a365f5a\" returns successfully" Jul 10 00:46:58.088617 kubelet[1452]: E0710 00:46:58.088575 1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 00:46:58.238282 kubelet[1452]: I0710 00:46:58.238076 1452 csi_plugin.go:106] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 Jul 10 00:46:58.238282 kubelet[1452]: I0710 00:46:58.238115 1452 csi_plugin.go:119] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock Jul 10 00:46:58.350200 kubelet[1452]: I0710 00:46:58.350090 1452 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/csi-node-driver-dt2n5" podStartSLOduration=26.444921697 podStartE2EDuration="31.350075874s" podCreationTimestamp="2025-07-10 00:46:27 +0000 UTC" firstStartedPulling="2025-07-10 00:46:52.617661207 +0000 UTC m=+26.312766244" lastFinishedPulling="2025-07-10 00:46:57.522815384 +0000 UTC m=+31.217920421" observedRunningTime="2025-07-10 00:46:58.34845601 +0000 UTC m=+32.043561047" watchObservedRunningTime="2025-07-10 00:46:58.350075874 +0000 UTC m=+32.045180911" Jul 10 00:46:59.089168 kubelet[1452]: E0710 00:46:59.089096 1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 00:46:59.997000 audit[2854]: NETFILTER_CFG table=filter:89 family=2 entries=8 op=nft_register_rule pid=2854 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 10 00:46:59.997000 audit[2854]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3016 a0=3 a1=ffffedc08710 a2=0 a3=1 items=0 ppid=1614 pid=2854 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:46:59.997000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 10 00:47:00.012000 audit[2854]: NETFILTER_CFG table=nat:90 family=2 entries=62 op=nft_register_chain pid=2854 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 10 00:47:00.012000 audit[2854]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=21988 a0=3 a1=ffffedc08710 a2=0 a3=1 items=0 ppid=1614 pid=2854 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:47:00.012000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 10 00:47:00.089761 kubelet[1452]: E0710 00:47:00.089700 1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 00:47:00.777034 systemd[1]: Created slice kubepods-besteffort-podf286dd84_9350_451a_abcb_aa977b59f4d9.slice. Jul 10 00:47:00.788443 kubelet[1452]: I0710 00:47:00.788405 1452 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"pvc-fb5a767d-b150-40c6-a251-37c998c2eb18\" (UniqueName: \"kubernetes.io/nfs/f286dd84-9350-451a-abcb-aa977b59f4d9-pvc-fb5a767d-b150-40c6-a251-37c998c2eb18\") pod \"test-pod-1\" (UID: \"f286dd84-9350-451a-abcb-aa977b59f4d9\") " pod="default/test-pod-1" Jul 10 00:47:00.788569 kubelet[1452]: I0710 00:47:00.788449 1452 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-7fk9v\" (UniqueName: \"kubernetes.io/projected/f286dd84-9350-451a-abcb-aa977b59f4d9-kube-api-access-7fk9v\") pod \"test-pod-1\" (UID: \"f286dd84-9350-451a-abcb-aa977b59f4d9\") " pod="default/test-pod-1" Jul 10 00:47:00.902000 audit[2860]: AVC avc: denied { confidentiality } for pid=2860 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:47:00.902000 audit[2860]: AVC avc: denied { confidentiality } for pid=2860 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:47:00.906605 kernel: Failed to create system directory netfs Jul 10 00:47:00.906674 kernel: Failed to create system directory netfs Jul 10 00:47:00.902000 audit[2860]: AVC avc: denied { confidentiality } for pid=2860 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:47:00.902000 audit[2860]: AVC avc: denied { confidentiality } for pid=2860 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:47:00.907538 kernel: Failed to create system directory netfs Jul 10 00:47:00.908513 kernel: Failed to create system directory netfs Jul 10 00:47:00.902000 audit[2860]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=aaaaf2b2d5e0 a1=12c14 a2=aaaab6c1e028 a3=aaaaf2b1e010 items=0 ppid=82 pid=2860 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:47:00.902000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Jul 10 00:47:00.911000 audit[2860]: AVC avc: denied { confidentiality } for pid=2860 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:47:00.911000 audit[2860]: AVC avc: denied { confidentiality } for pid=2860 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:47:00.916594 kernel: Failed to create system directory fscache Jul 10 00:47:00.916652 kernel: Failed to create system directory fscache Jul 10 00:47:00.911000 audit[2860]: AVC avc: denied { confidentiality } for pid=2860 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:47:00.911000 audit[2860]: AVC avc: denied { confidentiality } for pid=2860 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:47:00.918046 kernel: Failed to create system directory fscache Jul 10 00:47:00.918107 kernel: Failed to create system directory fscache Jul 10 00:47:00.911000 audit[2860]: AVC avc: denied { confidentiality } for pid=2860 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:47:00.918813 kernel: Failed to create system directory fscache Jul 10 00:47:00.911000 audit[2860]: AVC avc: denied { confidentiality } for pid=2860 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:47:00.919564 kernel: Failed to create system directory fscache Jul 10 00:47:00.911000 audit[2860]: AVC avc: denied { confidentiality } for pid=2860 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:47:00.911000 audit[2860]: AVC avc: denied { confidentiality } for pid=2860 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:47:00.920973 kernel: Failed to create system directory fscache Jul 10 00:47:00.921022 kernel: Failed to create system directory fscache Jul 10 00:47:00.911000 audit[2860]: AVC avc: denied { confidentiality } for pid=2860 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:47:00.921731 kernel: Failed to create system directory fscache Jul 10 00:47:00.911000 audit[2860]: AVC avc: denied { confidentiality } for pid=2860 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:47:00.911000 audit[2860]: AVC avc: denied { confidentiality } for pid=2860 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:47:00.922550 kernel: Failed to create system directory fscache Jul 10 00:47:00.911000 audit[2860]: AVC avc: denied { confidentiality } for pid=2860 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:47:00.923870 kernel: Failed to create system directory fscache Jul 10 00:47:00.923928 kernel: Failed to create system directory fscache Jul 10 00:47:00.911000 audit[2860]: AVC avc: denied { confidentiality } for pid=2860 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:47:00.924630 kernel: Failed to create system directory fscache Jul 10 00:47:00.911000 audit[2860]: AVC avc: denied { confidentiality } for pid=2860 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:47:00.925528 kernel: Failed to create system directory fscache Jul 10 00:47:00.911000 audit[2860]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=aaaaf2d40210 a1=4c344 a2=aaaab6c1e028 a3=aaaaf2b1e010 items=0 ppid=82 pid=2860 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:47:00.911000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Jul 10 00:47:00.926529 kernel: FS-Cache: Loaded Jul 10 00:47:00.940000 audit[2860]: AVC avc: denied { confidentiality } for pid=2860 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:47:00.940000 audit[2860]: AVC avc: denied { confidentiality } for pid=2860 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:47:00.949938 kernel: Failed to create system directory sunrpc Jul 10 00:47:00.950000 kernel: Failed to create system directory sunrpc Jul 10 00:47:00.940000 audit[2860]: AVC avc: denied { confidentiality } for pid=2860 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:47:00.940000 audit[2860]: AVC avc: denied { confidentiality } for pid=2860 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:47:00.952839 kernel: Failed to create system directory sunrpc Jul 10 00:47:00.952927 kernel: Failed to create system directory sunrpc Jul 10 00:47:00.952960 kernel: Failed to create system directory sunrpc Jul 10 00:47:00.954244 kernel: Failed to create system directory sunrpc Jul 10 00:47:00.954287 kernel: Failed to create system directory sunrpc Jul 10 00:47:00.940000 audit[2860]: AVC avc: denied { confidentiality } for pid=2860 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:47:00.940000 audit[2860]: AVC avc: denied { confidentiality } for pid=2860 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:47:00.940000 audit[2860]: AVC avc: denied { confidentiality } for pid=2860 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:47:00.940000 audit[2860]: AVC avc: denied { confidentiality } for pid=2860 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:47:00.940000 audit[2860]: AVC avc: denied { confidentiality } for pid=2860 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:47:00.955966 kernel: Failed to create system directory sunrpc Jul 10 00:47:00.956089 kernel: Failed to create system directory sunrpc Jul 10 00:47:00.956119 kernel: Failed to create system directory sunrpc Jul 10 00:47:00.940000 audit[2860]: AVC avc: denied { confidentiality } for pid=2860 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:47:00.940000 audit[2860]: AVC avc: denied { confidentiality } for pid=2860 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:47:00.958042 kernel: Failed to create system directory sunrpc Jul 10 00:47:00.958078 kernel: Failed to create system directory sunrpc Jul 10 00:47:00.940000 audit[2860]: AVC avc: denied { confidentiality } for pid=2860 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:47:00.940000 audit[2860]: AVC avc: denied { confidentiality } for pid=2860 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:47:00.940000 audit[2860]: AVC avc: denied { confidentiality } for pid=2860 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:47:00.960109 kernel: Failed to create system directory sunrpc Jul 10 00:47:00.960169 kernel: Failed to create system directory sunrpc Jul 10 00:47:00.960191 kernel: Failed to create system directory sunrpc Jul 10 00:47:00.940000 audit[2860]: AVC avc: denied { confidentiality } for pid=2860 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:47:00.940000 audit[2860]: AVC avc: denied { confidentiality } for pid=2860 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:47:00.963742 kernel: Failed to create system directory sunrpc Jul 10 00:47:00.963799 kernel: Failed to create system directory sunrpc Jul 10 00:47:00.963818 kernel: Failed to create system directory sunrpc Jul 10 00:47:00.963834 kernel: Failed to create system directory sunrpc Jul 10 00:47:00.940000 audit[2860]: AVC avc: denied { confidentiality } for pid=2860 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:47:00.940000 audit[2860]: AVC avc: denied { confidentiality } for pid=2860 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:47:00.940000 audit[2860]: AVC avc: denied { confidentiality } for pid=2860 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:47:00.940000 audit[2860]: AVC avc: denied { confidentiality } for pid=2860 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:47:00.964916 kernel: Failed to create system directory sunrpc Jul 10 00:47:00.964965 kernel: Failed to create system directory sunrpc Jul 10 00:47:00.940000 audit[2860]: AVC avc: denied { confidentiality } for pid=2860 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:47:00.940000 audit[2860]: AVC avc: denied { confidentiality } for pid=2860 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:47:00.966616 kernel: Failed to create system directory sunrpc Jul 10 00:47:00.966702 kernel: Failed to create system directory sunrpc Jul 10 00:47:00.940000 audit[2860]: AVC avc: denied { confidentiality } for pid=2860 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:47:00.967670 kernel: Failed to create system directory sunrpc Jul 10 00:47:00.940000 audit[2860]: AVC avc: denied { confidentiality } for pid=2860 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:47:00.940000 audit[2860]: AVC avc: denied { confidentiality } for pid=2860 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:47:00.969133 kernel: Failed to create system directory sunrpc Jul 10 00:47:00.969194 kernel: Failed to create system directory sunrpc Jul 10 00:47:00.940000 audit[2860]: AVC avc: denied { confidentiality } for pid=2860 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:47:00.969671 kernel: Failed to create system directory sunrpc Jul 10 00:47:00.940000 audit[2860]: AVC avc: denied { confidentiality } for pid=2860 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:47:00.940000 audit[2860]: AVC avc: denied { confidentiality } for pid=2860 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:47:00.970910 kernel: Failed to create system directory sunrpc Jul 10 00:47:00.971078 kernel: Failed to create system directory sunrpc Jul 10 00:47:00.940000 audit[2860]: AVC avc: denied { confidentiality } for pid=2860 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:47:00.940000 audit[2860]: AVC avc: denied { confidentiality } for pid=2860 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:47:00.971947 kernel: Failed to create system directory sunrpc Jul 10 00:47:00.972124 kernel: Failed to create system directory sunrpc Jul 10 00:47:00.940000 audit[2860]: AVC avc: denied { confidentiality } for pid=2860 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:47:00.972559 kernel: Failed to create system directory sunrpc Jul 10 00:47:00.940000 audit[2860]: AVC avc: denied { confidentiality } for pid=2860 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:47:00.940000 audit[2860]: AVC avc: denied { confidentiality } for pid=2860 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:47:00.973667 kernel: Failed to create system directory sunrpc Jul 10 00:47:00.973719 kernel: Failed to create system directory sunrpc Jul 10 00:47:00.940000 audit[2860]: AVC avc: denied { confidentiality } for pid=2860 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:47:00.940000 audit[2860]: AVC avc: denied { confidentiality } for pid=2860 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:47:00.974819 kernel: Failed to create system directory sunrpc Jul 10 00:47:00.974882 kernel: Failed to create system directory sunrpc Jul 10 00:47:00.940000 audit[2860]: AVC avc: denied { confidentiality } for pid=2860 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:47:00.940000 audit[2860]: AVC avc: denied { confidentiality } for pid=2860 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:47:00.975962 kernel: Failed to create system directory sunrpc Jul 10 00:47:00.976004 kernel: Failed to create system directory sunrpc Jul 10 00:47:00.940000 audit[2860]: AVC avc: denied { confidentiality } for pid=2860 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:47:00.940000 audit[2860]: AVC avc: denied { confidentiality } for pid=2860 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:47:00.940000 audit[2860]: AVC avc: denied { confidentiality } for pid=2860 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:47:00.977677 kernel: Failed to create system directory sunrpc Jul 10 00:47:00.977744 kernel: Failed to create system directory sunrpc Jul 10 00:47:00.977761 kernel: Failed to create system directory sunrpc Jul 10 00:47:00.940000 audit[2860]: AVC avc: denied { confidentiality } for pid=2860 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:47:00.940000 audit[2860]: AVC avc: denied { confidentiality } for pid=2860 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:47:00.979335 kernel: Failed to create system directory sunrpc Jul 10 00:47:00.979435 kernel: Failed to create system directory sunrpc Jul 10 00:47:00.979459 kernel: Failed to create system directory sunrpc Jul 10 00:47:00.940000 audit[2860]: AVC avc: denied { confidentiality } for pid=2860 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:47:00.940000 audit[2860]: AVC avc: denied { confidentiality } for pid=2860 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:47:00.940000 audit[2860]: AVC avc: denied { confidentiality } for pid=2860 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:47:00.980679 kernel: Failed to create system directory sunrpc Jul 10 00:47:00.980761 kernel: Failed to create system directory sunrpc Jul 10 00:47:00.940000 audit[2860]: AVC avc: denied { confidentiality } for pid=2860 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:47:00.940000 audit[2860]: AVC avc: denied { confidentiality } for pid=2860 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:47:00.982320 kernel: Failed to create system directory sunrpc Jul 10 00:47:00.982416 kernel: Failed to create system directory sunrpc Jul 10 00:47:00.982441 kernel: Failed to create system directory sunrpc Jul 10 00:47:00.940000 audit[2860]: AVC avc: denied { confidentiality } for pid=2860 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:47:00.940000 audit[2860]: AVC avc: denied { confidentiality } for pid=2860 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:47:00.982857 kernel: Failed to create system directory sunrpc Jul 10 00:47:00.940000 audit[2860]: AVC avc: denied { confidentiality } for pid=2860 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:47:00.940000 audit[2860]: AVC avc: denied { confidentiality } for pid=2860 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:47:00.983991 kernel: Failed to create system directory sunrpc Jul 10 00:47:00.984055 kernel: Failed to create system directory sunrpc Jul 10 00:47:00.940000 audit[2860]: AVC avc: denied { confidentiality } for pid=2860 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:47:00.985606 kernel: Failed to create system directory sunrpc Jul 10 00:47:00.985743 kernel: Failed to create system directory sunrpc Jul 10 00:47:00.985780 kernel: Failed to create system directory sunrpc Jul 10 00:47:00.940000 audit[2860]: AVC avc: denied { confidentiality } for pid=2860 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:47:00.940000 audit[2860]: AVC avc: denied { confidentiality } for pid=2860 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:47:00.940000 audit[2860]: AVC avc: denied { confidentiality } for pid=2860 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:47:00.940000 audit[2860]: AVC avc: denied { confidentiality } for pid=2860 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:47:00.986829 kernel: Failed to create system directory sunrpc Jul 10 00:47:00.986890 kernel: Failed to create system directory sunrpc Jul 10 00:47:00.940000 audit[2860]: AVC avc: denied { confidentiality } for pid=2860 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:47:00.940000 audit[2860]: AVC avc: denied { confidentiality } for pid=2860 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:47:00.987988 kernel: Failed to create system directory sunrpc Jul 10 00:47:00.988057 kernel: Failed to create system directory sunrpc Jul 10 00:47:00.940000 audit[2860]: AVC avc: denied { confidentiality } for pid=2860 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:47:00.940000 audit[2860]: AVC avc: denied { confidentiality } for pid=2860 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:47:00.940000 audit[2860]: AVC avc: denied { confidentiality } for pid=2860 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:47:00.989732 kernel: Failed to create system directory sunrpc Jul 10 00:47:00.989805 kernel: Failed to create system directory sunrpc Jul 10 00:47:00.989828 kernel: Failed to create system directory sunrpc Jul 10 00:47:00.940000 audit[2860]: AVC avc: denied { confidentiality } for pid=2860 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:47:00.940000 audit[2860]: AVC avc: denied { confidentiality } for pid=2860 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:47:00.990872 kernel: Failed to create system directory sunrpc Jul 10 00:47:00.990912 kernel: Failed to create system directory sunrpc Jul 10 00:47:00.940000 audit[2860]: AVC avc: denied { confidentiality } for pid=2860 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:47:00.940000 audit[2860]: AVC avc: denied { confidentiality } for pid=2860 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:47:00.992051 kernel: Failed to create system directory sunrpc Jul 10 00:47:00.992082 kernel: Failed to create system directory sunrpc Jul 10 00:47:00.940000 audit[2860]: AVC avc: denied { confidentiality } for pid=2860 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:47:00.940000 audit[2860]: AVC avc: denied { confidentiality } for pid=2860 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:47:00.940000 audit[2860]: AVC avc: denied { confidentiality } for pid=2860 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:47:00.993778 kernel: Failed to create system directory sunrpc Jul 10 00:47:00.993822 kernel: Failed to create system directory sunrpc Jul 10 00:47:00.993845 kernel: Failed to create system directory sunrpc Jul 10 00:47:00.940000 audit[2860]: AVC avc: denied { confidentiality } for pid=2860 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:47:00.940000 audit[2860]: AVC avc: denied { confidentiality } for pid=2860 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:47:00.994917 kernel: Failed to create system directory sunrpc Jul 10 00:47:00.994964 kernel: Failed to create system directory sunrpc Jul 10 00:47:00.940000 audit[2860]: AVC avc: denied { confidentiality } for pid=2860 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:47:00.940000 audit[2860]: AVC avc: denied { confidentiality } for pid=2860 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:47:00.940000 audit[2860]: AVC avc: denied { confidentiality } for pid=2860 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:47:00.996808 kernel: Failed to create system directory sunrpc Jul 10 00:47:00.996854 kernel: Failed to create system directory sunrpc Jul 10 00:47:00.996871 kernel: Failed to create system directory sunrpc Jul 10 00:47:00.940000 audit[2860]: AVC avc: denied { confidentiality } for pid=2860 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:47:00.940000 audit[2860]: AVC avc: denied { confidentiality } for pid=2860 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:47:00.998314 kernel: Failed to create system directory sunrpc Jul 10 00:47:00.998408 kernel: Failed to create system directory sunrpc Jul 10 00:47:00.940000 audit[2860]: AVC avc: denied { confidentiality } for pid=2860 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:47:00.940000 audit[2860]: AVC avc: denied { confidentiality } for pid=2860 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:47:01.000264 kernel: Failed to create system directory sunrpc Jul 10 00:47:01.000376 kernel: Failed to create system directory sunrpc Jul 10 00:47:00.940000 audit[2860]: AVC avc: denied { confidentiality } for pid=2860 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:47:01.000936 kernel: Failed to create system directory sunrpc Jul 10 00:47:00.940000 audit[2860]: AVC avc: denied { confidentiality } for pid=2860 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:47:00.940000 audit[2860]: AVC avc: denied { confidentiality } for pid=2860 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:47:01.002118 kernel: Failed to create system directory sunrpc Jul 10 00:47:01.002206 kernel: Failed to create system directory sunrpc Jul 10 00:47:00.940000 audit[2860]: AVC avc: denied { confidentiality } for pid=2860 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:47:00.940000 audit[2860]: AVC avc: denied { confidentiality } for pid=2860 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:47:00.940000 audit[2860]: AVC avc: denied { confidentiality } for pid=2860 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:47:01.003799 kernel: Failed to create system directory sunrpc Jul 10 00:47:01.003858 kernel: Failed to create system directory sunrpc Jul 10 00:47:01.003883 kernel: Failed to create system directory sunrpc Jul 10 00:47:00.940000 audit[2860]: AVC avc: denied { confidentiality } for pid=2860 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:47:00.940000 audit[2860]: AVC avc: denied { confidentiality } for pid=2860 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:47:01.004966 kernel: Failed to create system directory sunrpc Jul 10 00:47:01.005025 kernel: Failed to create system directory sunrpc Jul 10 00:47:00.940000 audit[2860]: AVC avc: denied { confidentiality } for pid=2860 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:47:00.940000 audit[2860]: AVC avc: denied { confidentiality } for pid=2860 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:47:00.940000 audit[2860]: AVC avc: denied { confidentiality } for pid=2860 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:47:01.006721 kernel: Failed to create system directory sunrpc Jul 10 00:47:01.006778 kernel: Failed to create system directory sunrpc Jul 10 00:47:01.006801 kernel: Failed to create system directory sunrpc Jul 10 00:47:00.940000 audit[2860]: AVC avc: denied { confidentiality } for pid=2860 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:47:00.940000 audit[2860]: AVC avc: denied { confidentiality } for pid=2860 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:47:01.007873 kernel: Failed to create system directory sunrpc Jul 10 00:47:01.007928 kernel: Failed to create system directory sunrpc Jul 10 00:47:00.940000 audit[2860]: AVC avc: denied { confidentiality } for pid=2860 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:47:00.940000 audit[2860]: AVC avc: denied { confidentiality } for pid=2860 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:47:01.009048 kernel: Failed to create system directory sunrpc Jul 10 00:47:01.009127 kernel: Failed to create system directory sunrpc Jul 10 00:47:00.940000 audit[2860]: AVC avc: denied { confidentiality } for pid=2860 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:47:00.940000 audit[2860]: AVC avc: denied { confidentiality } for pid=2860 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:47:00.940000 audit[2860]: AVC avc: denied { confidentiality } for pid=2860 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:47:01.010911 kernel: Failed to create system directory sunrpc Jul 10 00:47:01.010986 kernel: Failed to create system directory sunrpc Jul 10 00:47:01.011024 kernel: Failed to create system directory sunrpc Jul 10 00:47:00.940000 audit[2860]: AVC avc: denied { confidentiality } for pid=2860 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:47:00.940000 audit[2860]: AVC avc: denied { confidentiality } for pid=2860 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:47:01.011988 kernel: Failed to create system directory sunrpc Jul 10 00:47:01.012048 kernel: Failed to create system directory sunrpc Jul 10 00:47:00.940000 audit[2860]: AVC avc: denied { confidentiality } for pid=2860 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:47:00.940000 audit[2860]: AVC avc: denied { confidentiality } for pid=2860 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:47:00.940000 audit[2860]: AVC avc: denied { confidentiality } for pid=2860 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:47:01.013874 kernel: Failed to create system directory sunrpc Jul 10 00:47:01.013937 kernel: Failed to create system directory sunrpc Jul 10 00:47:01.013955 kernel: Failed to create system directory sunrpc Jul 10 00:47:00.940000 audit[2860]: AVC avc: denied { confidentiality } for pid=2860 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:47:00.940000 audit[2860]: AVC avc: denied { confidentiality } for pid=2860 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:47:01.015020 kernel: Failed to create system directory sunrpc Jul 10 00:47:01.015055 kernel: Failed to create system directory sunrpc Jul 10 00:47:00.940000 audit[2860]: AVC avc: denied { confidentiality } for pid=2860 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:47:00.940000 audit[2860]: AVC avc: denied { confidentiality } for pid=2860 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:47:00.940000 audit[2860]: AVC avc: denied { confidentiality } for pid=2860 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:47:01.016759 kernel: Failed to create system directory sunrpc Jul 10 00:47:01.016819 kernel: Failed to create system directory sunrpc Jul 10 00:47:01.016838 kernel: Failed to create system directory sunrpc Jul 10 00:47:00.940000 audit[2860]: AVC avc: denied { confidentiality } for pid=2860 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:47:00.940000 audit[2860]: AVC avc: denied { confidentiality } for pid=2860 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:47:01.017879 kernel: Failed to create system directory sunrpc Jul 10 00:47:01.017929 kernel: Failed to create system directory sunrpc Jul 10 00:47:00.940000 audit[2860]: AVC avc: denied { confidentiality } for pid=2860 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:47:00.940000 audit[2860]: AVC avc: denied { confidentiality } for pid=2860 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:47:01.019030 kernel: Failed to create system directory sunrpc Jul 10 00:47:01.019071 kernel: Failed to create system directory sunrpc Jul 10 00:47:00.940000 audit[2860]: AVC avc: denied { confidentiality } for pid=2860 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:47:00.940000 audit[2860]: AVC avc: denied { confidentiality } for pid=2860 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:47:00.940000 audit[2860]: AVC avc: denied { confidentiality } for pid=2860 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:47:01.020747 kernel: Failed to create system directory sunrpc Jul 10 00:47:01.020785 kernel: Failed to create system directory sunrpc Jul 10 00:47:01.020804 kernel: Failed to create system directory sunrpc Jul 10 00:47:00.940000 audit[2860]: AVC avc: denied { confidentiality } for pid=2860 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:47:00.940000 audit[2860]: AVC avc: denied { confidentiality } for pid=2860 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:47:01.021890 kernel: Failed to create system directory sunrpc Jul 10 00:47:01.021920 kernel: Failed to create system directory sunrpc Jul 10 00:47:00.940000 audit[2860]: AVC avc: denied { confidentiality } for pid=2860 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:47:00.940000 audit[2860]: AVC avc: denied { confidentiality } for pid=2860 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:47:01.023054 kernel: Failed to create system directory sunrpc Jul 10 00:47:01.023105 kernel: Failed to create system directory sunrpc Jul 10 00:47:00.940000 audit[2860]: AVC avc: denied { confidentiality } for pid=2860 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:47:00.940000 audit[2860]: AVC avc: denied { confidentiality } for pid=2860 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:47:00.940000 audit[2860]: AVC avc: denied { confidentiality } for pid=2860 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:47:01.024775 kernel: Failed to create system directory sunrpc Jul 10 00:47:01.024818 kernel: Failed to create system directory sunrpc Jul 10 00:47:01.024840 kernel: Failed to create system directory sunrpc Jul 10 00:47:00.940000 audit[2860]: AVC avc: denied { confidentiality } for pid=2860 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:47:00.940000 audit[2860]: AVC avc: denied { confidentiality } for pid=2860 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:47:01.025926 kernel: Failed to create system directory sunrpc Jul 10 00:47:01.025969 kernel: Failed to create system directory sunrpc Jul 10 00:47:00.940000 audit[2860]: AVC avc: denied { confidentiality } for pid=2860 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:47:00.940000 audit[2860]: AVC avc: denied { confidentiality } for pid=2860 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:47:00.940000 audit[2860]: AVC avc: denied { confidentiality } for pid=2860 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:47:01.028328 kernel: Failed to create system directory sunrpc Jul 10 00:47:01.028604 kernel: Failed to create system directory sunrpc Jul 10 00:47:01.028660 kernel: Failed to create system directory sunrpc Jul 10 00:47:00.940000 audit[2860]: AVC avc: denied { confidentiality } for pid=2860 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:47:00.940000 audit[2860]: AVC avc: denied { confidentiality } for pid=2860 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:47:01.031571 kernel: Failed to create system directory sunrpc Jul 10 00:47:01.040753 kernel: RPC: Registered named UNIX socket transport module. Jul 10 00:47:01.040849 kernel: RPC: Registered udp transport module. Jul 10 00:47:01.040874 kernel: RPC: Registered tcp transport module. Jul 10 00:47:01.042003 kernel: RPC: Registered tcp NFSv4.1 backchannel transport module. Jul 10 00:47:00.940000 audit[2860]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=aaaaf2d8c560 a1=14a74c a2=aaaab6c1e028 a3=aaaaf2b1e010 items=6 ppid=82 pid=2860 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:47:00.940000 audit: CWD cwd="/" Jul 10 00:47:00.940000 audit: PATH item=0 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:47:00.940000 audit: PATH item=1 name=(null) inode=17778 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:47:00.940000 audit: PATH item=2 name=(null) inode=17778 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:47:00.940000 audit: PATH item=3 name=(null) inode=17779 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:47:00.940000 audit: PATH item=4 name=(null) inode=17778 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:47:00.940000 audit: PATH item=5 name=(null) inode=17780 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:47:00.940000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Jul 10 00:47:01.062000 audit[2860]: AVC avc: denied { confidentiality } for pid=2860 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:47:01.062000 audit[2860]: AVC avc: denied { confidentiality } for pid=2860 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:47:01.062000 audit[2860]: AVC avc: denied { confidentiality } for pid=2860 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:47:01.070624 kernel: Failed to create system directory nfs Jul 10 00:47:01.070708 kernel: Failed to create system directory nfs Jul 10 00:47:01.070726 kernel: Failed to create system directory nfs Jul 10 00:47:01.070741 kernel: Failed to create system directory nfs Jul 10 00:47:01.070760 kernel: Failed to create system directory nfs Jul 10 00:47:01.062000 audit[2860]: AVC avc: denied { confidentiality } for pid=2860 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:47:01.062000 audit[2860]: AVC avc: denied { confidentiality } for pid=2860 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:47:01.071025 kernel: Failed to create system directory nfs Jul 10 00:47:01.062000 audit[2860]: AVC avc: denied { confidentiality } for pid=2860 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:47:01.062000 audit[2860]: AVC avc: denied { confidentiality } for pid=2860 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:47:01.062000 audit[2860]: AVC avc: denied { confidentiality } for pid=2860 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:47:01.072616 kernel: Failed to create system directory nfs Jul 10 00:47:01.072657 kernel: Failed to create system directory nfs Jul 10 00:47:01.072676 kernel: Failed to create system directory nfs Jul 10 00:47:01.062000 audit[2860]: AVC avc: denied { confidentiality } for pid=2860 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:47:01.062000 audit[2860]: AVC avc: denied { confidentiality } for pid=2860 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:47:01.073693 kernel: Failed to create system directory nfs Jul 10 00:47:01.073721 kernel: Failed to create system directory nfs Jul 10 00:47:01.062000 audit[2860]: AVC avc: denied { confidentiality } for pid=2860 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:47:01.062000 audit[2860]: AVC avc: denied { confidentiality } for pid=2860 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:47:01.074775 kernel: Failed to create system directory nfs Jul 10 00:47:01.062000 audit[2860]: AVC avc: denied { confidentiality } for pid=2860 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:47:01.062000 audit[2860]: AVC avc: denied { confidentiality } for pid=2860 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:47:01.075864 kernel: Failed to create system directory nfs Jul 10 00:47:01.075907 kernel: Failed to create system directory nfs Jul 10 00:47:01.075926 kernel: Failed to create system directory nfs Jul 10 00:47:01.062000 audit[2860]: AVC avc: denied { confidentiality } for pid=2860 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:47:01.062000 audit[2860]: AVC avc: denied { confidentiality } for pid=2860 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:47:01.076965 kernel: Failed to create system directory nfs Jul 10 00:47:01.076996 kernel: Failed to create system directory nfs Jul 10 00:47:01.062000 audit[2860]: AVC avc: denied { confidentiality } for pid=2860 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:47:01.062000 audit[2860]: AVC avc: denied { confidentiality } for pid=2860 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:47:01.062000 audit[2860]: AVC avc: denied { confidentiality } for pid=2860 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:47:01.078588 kernel: Failed to create system directory nfs Jul 10 00:47:01.078621 kernel: Failed to create system directory nfs Jul 10 00:47:01.078640 kernel: Failed to create system directory nfs Jul 10 00:47:01.062000 audit[2860]: AVC avc: denied { confidentiality } for pid=2860 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:47:01.062000 audit[2860]: AVC avc: denied { confidentiality } for pid=2860 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:47:01.079665 kernel: Failed to create system directory nfs Jul 10 00:47:01.079690 kernel: Failed to create system directory nfs Jul 10 00:47:01.062000 audit[2860]: AVC avc: denied { confidentiality } for pid=2860 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:47:01.062000 audit[2860]: AVC avc: denied { confidentiality } for pid=2860 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:47:01.080747 kernel: Failed to create system directory nfs Jul 10 00:47:01.080772 kernel: Failed to create system directory nfs Jul 10 00:47:01.062000 audit[2860]: AVC avc: denied { confidentiality } for pid=2860 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:47:01.062000 audit[2860]: AVC avc: denied { confidentiality } for pid=2860 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:47:01.081839 kernel: Failed to create system directory nfs Jul 10 00:47:01.081865 kernel: Failed to create system directory nfs Jul 10 00:47:01.062000 audit[2860]: AVC avc: denied { confidentiality } for pid=2860 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:47:01.062000 audit[2860]: AVC avc: denied { confidentiality } for pid=2860 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:47:01.082927 kernel: Failed to create system directory nfs Jul 10 00:47:01.082953 kernel: Failed to create system directory nfs Jul 10 00:47:01.062000 audit[2860]: AVC avc: denied { confidentiality } for pid=2860 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:47:01.062000 audit[2860]: AVC avc: denied { confidentiality } for pid=2860 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:47:01.084014 kernel: Failed to create system directory nfs Jul 10 00:47:01.062000 audit[2860]: AVC avc: denied { confidentiality } for pid=2860 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:47:01.084561 kernel: Failed to create system directory nfs Jul 10 00:47:01.084588 kernel: Failed to create system directory nfs Jul 10 00:47:01.062000 audit[2860]: AVC avc: denied { confidentiality } for pid=2860 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:47:01.062000 audit[2860]: AVC avc: denied { confidentiality } for pid=2860 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:47:01.085642 kernel: Failed to create system directory nfs Jul 10 00:47:01.062000 audit[2860]: AVC avc: denied { confidentiality } for pid=2860 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:47:01.062000 audit[2860]: AVC avc: denied { confidentiality } for pid=2860 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:47:01.086722 kernel: Failed to create system directory nfs Jul 10 00:47:01.086754 kernel: Failed to create system directory nfs Jul 10 00:47:01.086774 kernel: Failed to create system directory nfs Jul 10 00:47:01.062000 audit[2860]: AVC avc: denied { confidentiality } for pid=2860 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:47:01.062000 audit[2860]: AVC avc: denied { confidentiality } for pid=2860 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:47:01.087809 kernel: Failed to create system directory nfs Jul 10 00:47:01.087841 kernel: Failed to create system directory nfs Jul 10 00:47:01.062000 audit[2860]: AVC avc: denied { confidentiality } for pid=2860 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:47:01.062000 audit[2860]: AVC avc: denied { confidentiality } for pid=2860 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:47:01.088888 kernel: Failed to create system directory nfs Jul 10 00:47:01.088920 kernel: Failed to create system directory nfs Jul 10 00:47:01.062000 audit[2860]: AVC avc: denied { confidentiality } for pid=2860 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:47:01.062000 audit[2860]: AVC avc: denied { confidentiality } for pid=2860 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:47:01.089978 kernel: Failed to create system directory nfs Jul 10 00:47:01.090010 kernel: Failed to create system directory nfs Jul 10 00:47:01.062000 audit[2860]: AVC avc: denied { confidentiality } for pid=2860 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:47:01.090057 kubelet[1452]: E0710 00:47:01.090033 1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 00:47:01.062000 audit[2860]: AVC avc: denied { confidentiality } for pid=2860 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:47:01.062000 audit[2860]: AVC avc: denied { confidentiality } for pid=2860 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:47:01.091647 kernel: Failed to create system directory nfs Jul 10 00:47:01.091689 kernel: Failed to create system directory nfs Jul 10 00:47:01.091710 kernel: Failed to create system directory nfs Jul 10 00:47:01.062000 audit[2860]: AVC avc: denied { confidentiality } for pid=2860 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:47:01.062000 audit[2860]: AVC avc: denied { confidentiality } for pid=2860 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:47:01.092742 kernel: Failed to create system directory nfs Jul 10 00:47:01.092777 kernel: Failed to create system directory nfs Jul 10 00:47:01.062000 audit[2860]: AVC avc: denied { confidentiality } for pid=2860 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:47:01.062000 audit[2860]: AVC avc: denied { confidentiality } for pid=2860 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:47:01.093825 kernel: Failed to create system directory nfs Jul 10 00:47:01.093858 kernel: Failed to create system directory nfs Jul 10 00:47:01.062000 audit[2860]: AVC avc: denied { confidentiality } for pid=2860 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:47:01.062000 audit[2860]: AVC avc: denied { confidentiality } for pid=2860 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:47:01.094911 kernel: Failed to create system directory nfs Jul 10 00:47:01.062000 audit[2860]: AVC avc: denied { confidentiality } for pid=2860 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:47:01.062000 audit[2860]: AVC avc: denied { confidentiality } for pid=2860 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:47:01.096000 kernel: Failed to create system directory nfs Jul 10 00:47:01.096018 kernel: Failed to create system directory nfs Jul 10 00:47:01.096046 kernel: Failed to create system directory nfs Jul 10 00:47:01.062000 audit[2860]: AVC avc: denied { confidentiality } for pid=2860 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:47:01.062000 audit[2860]: AVC avc: denied { confidentiality } for pid=2860 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:47:01.062000 audit[2860]: AVC avc: denied { confidentiality } for pid=2860 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:47:01.097633 kernel: Failed to create system directory nfs Jul 10 00:47:01.097664 kernel: Failed to create system directory nfs Jul 10 00:47:01.097680 kernel: Failed to create system directory nfs Jul 10 00:47:01.062000 audit[2860]: AVC avc: denied { confidentiality } for pid=2860 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:47:01.062000 audit[2860]: AVC avc: denied { confidentiality } for pid=2860 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:47:01.098713 kernel: Failed to create system directory nfs Jul 10 00:47:01.098739 kernel: Failed to create system directory nfs Jul 10 00:47:01.062000 audit[2860]: AVC avc: denied { confidentiality } for pid=2860 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:47:01.062000 audit[2860]: AVC avc: denied { confidentiality } for pid=2860 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:47:01.099793 kernel: Failed to create system directory nfs Jul 10 00:47:01.099816 kernel: Failed to create system directory nfs Jul 10 00:47:01.062000 audit[2860]: AVC avc: denied { confidentiality } for pid=2860 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:47:01.062000 audit[2860]: AVC avc: denied { confidentiality } for pid=2860 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:47:01.100874 kernel: Failed to create system directory nfs Jul 10 00:47:01.062000 audit[2860]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=aaaaf2f35a40 a1=116364 a2=aaaab6c1e028 a3=aaaaf2b1e010 items=0 ppid=82 pid=2860 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:47:01.062000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Jul 10 00:47:01.116540 kernel: FS-Cache: Netfs 'nfs' registered for caching Jul 10 00:47:01.134000 audit[2867]: AVC avc: denied { confidentiality } for pid=2867 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:47:01.134000 audit[2867]: AVC avc: denied { confidentiality } for pid=2867 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:47:01.134000 audit[2867]: AVC avc: denied { confidentiality } for pid=2867 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:47:01.144035 kernel: Failed to create system directory nfs4 Jul 10 00:47:01.144076 kernel: Failed to create system directory nfs4 Jul 10 00:47:01.144092 kernel: Failed to create system directory nfs4 Jul 10 00:47:01.144117 kernel: Failed to create system directory nfs4 Jul 10 00:47:01.134000 audit[2867]: AVC avc: denied { confidentiality } for pid=2867 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:47:01.134000 audit[2867]: AVC avc: denied { confidentiality } for pid=2867 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:47:01.134000 audit[2867]: AVC avc: denied { confidentiality } for pid=2867 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:47:01.145699 kernel: Failed to create system directory nfs4 Jul 10 00:47:01.145730 kernel: Failed to create system directory nfs4 Jul 10 00:47:01.145744 kernel: Failed to create system directory nfs4 Jul 10 00:47:01.134000 audit[2867]: AVC avc: denied { confidentiality } for pid=2867 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:47:01.134000 audit[2867]: AVC avc: denied { confidentiality } for pid=2867 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:47:01.146805 kernel: Failed to create system directory nfs4 Jul 10 00:47:01.146845 kernel: Failed to create system directory nfs4 Jul 10 00:47:01.134000 audit[2867]: AVC avc: denied { confidentiality } for pid=2867 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:47:01.134000 audit[2867]: AVC avc: denied { confidentiality } for pid=2867 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:47:01.147917 kernel: Failed to create system directory nfs4 Jul 10 00:47:01.134000 audit[2867]: AVC avc: denied { confidentiality } for pid=2867 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:47:01.134000 audit[2867]: AVC avc: denied { confidentiality } for pid=2867 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:47:01.149052 kernel: Failed to create system directory nfs4 Jul 10 00:47:01.149083 kernel: Failed to create system directory nfs4 Jul 10 00:47:01.149098 kernel: Failed to create system directory nfs4 Jul 10 00:47:01.134000 audit[2867]: AVC avc: denied { confidentiality } for pid=2867 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:47:01.134000 audit[2867]: AVC avc: denied { confidentiality } for pid=2867 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:47:01.134000 audit[2867]: AVC avc: denied { confidentiality } for pid=2867 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:47:01.150826 kernel: Failed to create system directory nfs4 Jul 10 00:47:01.150868 kernel: Failed to create system directory nfs4 Jul 10 00:47:01.150884 kernel: Failed to create system directory nfs4 Jul 10 00:47:01.134000 audit[2867]: AVC avc: denied { confidentiality } for pid=2867 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:47:01.134000 audit[2867]: AVC avc: denied { confidentiality } for pid=2867 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:47:01.152050 kernel: Failed to create system directory nfs4 Jul 10 00:47:01.152083 kernel: Failed to create system directory nfs4 Jul 10 00:47:01.134000 audit[2867]: AVC avc: denied { confidentiality } for pid=2867 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:47:01.134000 audit[2867]: AVC avc: denied { confidentiality } for pid=2867 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:47:01.134000 audit[2867]: AVC avc: denied { confidentiality } for pid=2867 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:47:01.153858 kernel: Failed to create system directory nfs4 Jul 10 00:47:01.153898 kernel: Failed to create system directory nfs4 Jul 10 00:47:01.153913 kernel: Failed to create system directory nfs4 Jul 10 00:47:01.134000 audit[2867]: AVC avc: denied { confidentiality } for pid=2867 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:47:01.134000 audit[2867]: AVC avc: denied { confidentiality } for pid=2867 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:47:01.155067 kernel: Failed to create system directory nfs4 Jul 10 00:47:01.134000 audit[2867]: AVC avc: denied { confidentiality } for pid=2867 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:47:01.134000 audit[2867]: AVC avc: denied { confidentiality } for pid=2867 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:47:01.157037 kernel: Failed to create system directory nfs4 Jul 10 00:47:01.157068 kernel: Failed to create system directory nfs4 Jul 10 00:47:01.157099 kernel: Failed to create system directory nfs4 Jul 10 00:47:01.134000 audit[2867]: AVC avc: denied { confidentiality } for pid=2867 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:47:01.134000 audit[2867]: AVC avc: denied { confidentiality } for pid=2867 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:47:01.134000 audit[2867]: AVC avc: denied { confidentiality } for pid=2867 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:47:01.158761 kernel: Failed to create system directory nfs4 Jul 10 00:47:01.158798 kernel: Failed to create system directory nfs4 Jul 10 00:47:01.158813 kernel: Failed to create system directory nfs4 Jul 10 00:47:01.134000 audit[2867]: AVC avc: denied { confidentiality } for pid=2867 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:47:01.134000 audit[2867]: AVC avc: denied { confidentiality } for pid=2867 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:47:01.159906 kernel: Failed to create system directory nfs4 Jul 10 00:47:01.159946 kernel: Failed to create system directory nfs4 Jul 10 00:47:01.134000 audit[2867]: AVC avc: denied { confidentiality } for pid=2867 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:47:01.134000 audit[2867]: AVC avc: denied { confidentiality } for pid=2867 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:47:01.161051 kernel: Failed to create system directory nfs4 Jul 10 00:47:01.161089 kernel: Failed to create system directory nfs4 Jul 10 00:47:01.134000 audit[2867]: AVC avc: denied { confidentiality } for pid=2867 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:47:01.134000 audit[2867]: AVC avc: denied { confidentiality } for pid=2867 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:47:01.134000 audit[2867]: AVC avc: denied { confidentiality } for pid=2867 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:47:01.162761 kernel: Failed to create system directory nfs4 Jul 10 00:47:01.162796 kernel: Failed to create system directory nfs4 Jul 10 00:47:01.162825 kernel: Failed to create system directory nfs4 Jul 10 00:47:01.134000 audit[2867]: AVC avc: denied { confidentiality } for pid=2867 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:47:01.134000 audit[2867]: AVC avc: denied { confidentiality } for pid=2867 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:47:01.163922 kernel: Failed to create system directory nfs4 Jul 10 00:47:01.163955 kernel: Failed to create system directory nfs4 Jul 10 00:47:01.134000 audit[2867]: AVC avc: denied { confidentiality } for pid=2867 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:47:01.134000 audit[2867]: AVC avc: denied { confidentiality } for pid=2867 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:47:01.134000 audit[2867]: AVC avc: denied { confidentiality } for pid=2867 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:47:01.165643 kernel: Failed to create system directory nfs4 Jul 10 00:47:01.165665 kernel: Failed to create system directory nfs4 Jul 10 00:47:01.165687 kernel: Failed to create system directory nfs4 Jul 10 00:47:01.134000 audit[2867]: AVC avc: denied { confidentiality } for pid=2867 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:47:01.134000 audit[2867]: AVC avc: denied { confidentiality } for pid=2867 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:47:01.166796 kernel: Failed to create system directory nfs4 Jul 10 00:47:01.166835 kernel: Failed to create system directory nfs4 Jul 10 00:47:01.134000 audit[2867]: AVC avc: denied { confidentiality } for pid=2867 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:47:01.134000 audit[2867]: AVC avc: denied { confidentiality } for pid=2867 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:47:01.168058 kernel: Failed to create system directory nfs4 Jul 10 00:47:01.168110 kernel: Failed to create system directory nfs4 Jul 10 00:47:01.134000 audit[2867]: AVC avc: denied { confidentiality } for pid=2867 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:47:01.134000 audit[2867]: AVC avc: denied { confidentiality } for pid=2867 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:47:01.134000 audit[2867]: AVC avc: denied { confidentiality } for pid=2867 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:47:01.169877 kernel: Failed to create system directory nfs4 Jul 10 00:47:01.169908 kernel: Failed to create system directory nfs4 Jul 10 00:47:01.169924 kernel: Failed to create system directory nfs4 Jul 10 00:47:01.134000 audit[2867]: AVC avc: denied { confidentiality } for pid=2867 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:47:01.134000 audit[2867]: AVC avc: denied { confidentiality } for pid=2867 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:47:01.134000 audit[2867]: AVC avc: denied { confidentiality } for pid=2867 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:47:01.171699 kernel: Failed to create system directory nfs4 Jul 10 00:47:01.171747 kernel: Failed to create system directory nfs4 Jul 10 00:47:01.171770 kernel: Failed to create system directory nfs4 Jul 10 00:47:01.134000 audit[2867]: AVC avc: denied { confidentiality } for pid=2867 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:47:01.134000 audit[2867]: AVC avc: denied { confidentiality } for pid=2867 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:47:01.172910 kernel: Failed to create system directory nfs4 Jul 10 00:47:01.134000 audit[2867]: AVC avc: denied { confidentiality } for pid=2867 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:47:01.173515 kernel: Failed to create system directory nfs4 Jul 10 00:47:01.173569 kernel: Failed to create system directory nfs4 Jul 10 00:47:01.134000 audit[2867]: AVC avc: denied { confidentiality } for pid=2867 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:47:01.134000 audit[2867]: AVC avc: denied { confidentiality } for pid=2867 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:47:01.174755 kernel: Failed to create system directory nfs4 Jul 10 00:47:01.174817 kernel: Failed to create system directory nfs4 Jul 10 00:47:01.134000 audit[2867]: AVC avc: denied { confidentiality } for pid=2867 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:47:01.134000 audit[2867]: AVC avc: denied { confidentiality } for pid=2867 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:47:01.175974 kernel: Failed to create system directory nfs4 Jul 10 00:47:01.176038 kernel: Failed to create system directory nfs4 Jul 10 00:47:01.134000 audit[2867]: AVC avc: denied { confidentiality } for pid=2867 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:47:01.134000 audit[2867]: AVC avc: denied { confidentiality } for pid=2867 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:47:01.134000 audit[2867]: AVC avc: denied { confidentiality } for pid=2867 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:47:01.177839 kernel: Failed to create system directory nfs4 Jul 10 00:47:01.177888 kernel: Failed to create system directory nfs4 Jul 10 00:47:01.177908 kernel: Failed to create system directory nfs4 Jul 10 00:47:01.134000 audit[2867]: AVC avc: denied { confidentiality } for pid=2867 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:47:01.134000 audit[2867]: AVC avc: denied { confidentiality } for pid=2867 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:47:01.179024 kernel: Failed to create system directory nfs4 Jul 10 00:47:01.179060 kernel: Failed to create system directory nfs4 Jul 10 00:47:01.134000 audit[2867]: AVC avc: denied { confidentiality } for pid=2867 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:47:01.134000 audit[2867]: AVC avc: denied { confidentiality } for pid=2867 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:47:01.134000 audit[2867]: AVC avc: denied { confidentiality } for pid=2867 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:47:01.180744 kernel: Failed to create system directory nfs4 Jul 10 00:47:01.180831 kernel: Failed to create system directory nfs4 Jul 10 00:47:01.180849 kernel: Failed to create system directory nfs4 Jul 10 00:47:01.134000 audit[2867]: AVC avc: denied { confidentiality } for pid=2867 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:47:01.134000 audit[2867]: AVC avc: denied { confidentiality } for pid=2867 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:47:01.181874 kernel: Failed to create system directory nfs4 Jul 10 00:47:01.181949 kernel: Failed to create system directory nfs4 Jul 10 00:47:01.134000 audit[2867]: AVC avc: denied { confidentiality } for pid=2867 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:47:01.134000 audit[2867]: AVC avc: denied { confidentiality } for pid=2867 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:47:01.183023 kernel: Failed to create system directory nfs4 Jul 10 00:47:01.183099 kernel: Failed to create system directory nfs4 Jul 10 00:47:01.134000 audit[2867]: AVC avc: denied { confidentiality } for pid=2867 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:47:01.134000 audit[2867]: AVC avc: denied { confidentiality } for pid=2867 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:47:01.134000 audit[2867]: AVC avc: denied { confidentiality } for pid=2867 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:47:01.184705 kernel: Failed to create system directory nfs4 Jul 10 00:47:01.184754 kernel: Failed to create system directory nfs4 Jul 10 00:47:01.184775 kernel: Failed to create system directory nfs4 Jul 10 00:47:01.134000 audit[2867]: AVC avc: denied { confidentiality } for pid=2867 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:47:01.134000 audit[2867]: AVC avc: denied { confidentiality } for pid=2867 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:47:01.185831 kernel: Failed to create system directory nfs4 Jul 10 00:47:01.185867 kernel: Failed to create system directory nfs4 Jul 10 00:47:01.134000 audit[2867]: AVC avc: denied { confidentiality } for pid=2867 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:47:01.134000 audit[2867]: AVC avc: denied { confidentiality } for pid=2867 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:47:01.186965 kernel: Failed to create system directory nfs4 Jul 10 00:47:01.187004 kernel: Failed to create system directory nfs4 Jul 10 00:47:01.134000 audit[2867]: AVC avc: denied { confidentiality } for pid=2867 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:47:01.134000 audit[2867]: AVC avc: denied { confidentiality } for pid=2867 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:47:01.134000 audit[2867]: AVC avc: denied { confidentiality } for pid=2867 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:47:01.188666 kernel: Failed to create system directory nfs4 Jul 10 00:47:01.188710 kernel: Failed to create system directory nfs4 Jul 10 00:47:01.188731 kernel: Failed to create system directory nfs4 Jul 10 00:47:01.134000 audit[2867]: AVC avc: denied { confidentiality } for pid=2867 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:47:01.134000 audit[2867]: AVC avc: denied { confidentiality } for pid=2867 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:47:01.189777 kernel: Failed to create system directory nfs4 Jul 10 00:47:01.189816 kernel: Failed to create system directory nfs4 Jul 10 00:47:01.134000 audit[2867]: AVC avc: denied { confidentiality } for pid=2867 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:47:01.134000 audit[2867]: AVC avc: denied { confidentiality } for pid=2867 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:47:01.190906 kernel: Failed to create system directory nfs4 Jul 10 00:47:01.134000 audit[2867]: AVC avc: denied { confidentiality } for pid=2867 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:47:01.191518 kernel: Failed to create system directory nfs4 Jul 10 00:47:01.191554 kernel: Failed to create system directory nfs4 Jul 10 00:47:01.134000 audit[2867]: AVC avc: denied { confidentiality } for pid=2867 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:47:01.134000 audit[2867]: AVC avc: denied { confidentiality } for pid=2867 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:47:01.192643 kernel: Failed to create system directory nfs4 Jul 10 00:47:01.134000 audit[2867]: AVC avc: denied { confidentiality } for pid=2867 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:47:01.134000 audit[2867]: AVC avc: denied { confidentiality } for pid=2867 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:47:01.193805 kernel: Failed to create system directory nfs4 Jul 10 00:47:01.193837 kernel: Failed to create system directory nfs4 Jul 10 00:47:01.193861 kernel: Failed to create system directory nfs4 Jul 10 00:47:01.134000 audit[2867]: AVC avc: denied { confidentiality } for pid=2867 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:47:01.134000 audit[2867]: AVC avc: denied { confidentiality } for pid=2867 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:47:01.194925 kernel: Failed to create system directory nfs4 Jul 10 00:47:01.194956 kernel: Failed to create system directory nfs4 Jul 10 00:47:01.134000 audit[2867]: AVC avc: denied { confidentiality } for pid=2867 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:47:01.195517 kernel: Failed to create system directory nfs4 Jul 10 00:47:01.134000 audit[2867]: AVC avc: denied { confidentiality } for pid=2867 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:47:01.134000 audit[2867]: AVC avc: denied { confidentiality } for pid=2867 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:47:01.196611 kernel: Failed to create system directory nfs4 Jul 10 00:47:01.134000 audit[2867]: AVC avc: denied { confidentiality } for pid=2867 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:47:01.134000 audit[2867]: AVC avc: denied { confidentiality } for pid=2867 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:47:01.197755 kernel: Failed to create system directory nfs4 Jul 10 00:47:01.197780 kernel: Failed to create system directory nfs4 Jul 10 00:47:01.299973 kernel: NFS: Registering the id_resolver key type Jul 10 00:47:01.300080 kernel: Key type id_resolver registered Jul 10 00:47:01.300119 kernel: Key type id_legacy registered Jul 10 00:47:01.134000 audit[2867]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=ffff9014a010 a1=19c79c a2=aaaadd41e028 a3=aaab02468010 items=0 ppid=82 pid=2867 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:47:01.134000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D006E66737634 Jul 10 00:47:01.309000 audit[2869]: AVC avc: denied { confidentiality } for pid=2869 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:47:01.309000 audit[2869]: AVC avc: denied { confidentiality } for pid=2869 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:47:01.314287 kernel: Failed to create system directory rpcgss Jul 10 00:47:01.314380 kernel: Failed to create system directory rpcgss Jul 10 00:47:01.314399 kernel: Failed to create system directory rpcgss Jul 10 00:47:01.309000 audit[2869]: AVC avc: denied { confidentiality } for pid=2869 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:47:01.309000 audit[2869]: AVC avc: denied { confidentiality } for pid=2869 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:47:01.309000 audit[2869]: AVC avc: denied { confidentiality } for pid=2869 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:47:01.315780 kernel: Failed to create system directory rpcgss Jul 10 00:47:01.315815 kernel: Failed to create system directory rpcgss Jul 10 00:47:01.315849 kernel: Failed to create system directory rpcgss Jul 10 00:47:01.309000 audit[2869]: AVC avc: denied { confidentiality } for pid=2869 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:47:01.309000 audit[2869]: AVC avc: denied { confidentiality } for pid=2869 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:47:01.316960 kernel: Failed to create system directory rpcgss Jul 10 00:47:01.317011 kernel: Failed to create system directory rpcgss Jul 10 00:47:01.309000 audit[2869]: AVC avc: denied { confidentiality } for pid=2869 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:47:01.309000 audit[2869]: AVC avc: denied { confidentiality } for pid=2869 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:47:01.309000 audit[2869]: AVC avc: denied { confidentiality } for pid=2869 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:47:01.318712 kernel: Failed to create system directory rpcgss Jul 10 00:47:01.318758 kernel: Failed to create system directory rpcgss Jul 10 00:47:01.318778 kernel: Failed to create system directory rpcgss Jul 10 00:47:01.309000 audit[2869]: AVC avc: denied { confidentiality } for pid=2869 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:47:01.309000 audit[2869]: AVC avc: denied { confidentiality } for pid=2869 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:47:01.319886 kernel: Failed to create system directory rpcgss Jul 10 00:47:01.319915 kernel: Failed to create system directory rpcgss Jul 10 00:47:01.309000 audit[2869]: AVC avc: denied { confidentiality } for pid=2869 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:47:01.309000 audit[2869]: AVC avc: denied { confidentiality } for pid=2869 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:47:01.321068 kernel: Failed to create system directory rpcgss Jul 10 00:47:01.321099 kernel: Failed to create system directory rpcgss Jul 10 00:47:01.309000 audit[2869]: AVC avc: denied { confidentiality } for pid=2869 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:47:01.309000 audit[2869]: AVC avc: denied { confidentiality } for pid=2869 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:47:01.309000 audit[2869]: AVC avc: denied { confidentiality } for pid=2869 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:47:01.322842 kernel: Failed to create system directory rpcgss Jul 10 00:47:01.322892 kernel: Failed to create system directory rpcgss Jul 10 00:47:01.322918 kernel: Failed to create system directory rpcgss Jul 10 00:47:01.309000 audit[2869]: AVC avc: denied { confidentiality } for pid=2869 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:47:01.309000 audit[2869]: AVC avc: denied { confidentiality } for pid=2869 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:47:01.324040 kernel: Failed to create system directory rpcgss Jul 10 00:47:01.324075 kernel: Failed to create system directory rpcgss Jul 10 00:47:01.309000 audit[2869]: AVC avc: denied { confidentiality } for pid=2869 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:47:01.309000 audit[2869]: AVC avc: denied { confidentiality } for pid=2869 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:47:01.309000 audit[2869]: AVC avc: denied { confidentiality } for pid=2869 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:47:01.325806 kernel: Failed to create system directory rpcgss Jul 10 00:47:01.325833 kernel: Failed to create system directory rpcgss Jul 10 00:47:01.325847 kernel: Failed to create system directory rpcgss Jul 10 00:47:01.309000 audit[2869]: AVC avc: denied { confidentiality } for pid=2869 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:47:01.309000 audit[2869]: AVC avc: denied { confidentiality } for pid=2869 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:47:01.326986 kernel: Failed to create system directory rpcgss Jul 10 00:47:01.327010 kernel: Failed to create system directory rpcgss Jul 10 00:47:01.309000 audit[2869]: AVC avc: denied { confidentiality } for pid=2869 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:47:01.309000 audit[2869]: AVC avc: denied { confidentiality } for pid=2869 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:47:01.328522 kernel: Failed to create system directory rpcgss Jul 10 00:47:01.309000 audit[2869]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=ffff9f7d2010 a1=5ee94 a2=aaaacffae028 a3=aaaaeb14c010 items=0 ppid=82 pid=2869 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:47:01.309000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D007270632D617574682D36 Jul 10 00:47:01.351157 nfsidmap[2876]: nss_getpwnam: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain 'localdomain' Jul 10 00:47:01.353979 nfsidmap[2879]: nss_name_to_gid: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain 'localdomain' Jul 10 00:47:01.360000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2412 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Jul 10 00:47:01.360000 audit[1280]: AVC avc: denied { watch_reads } for pid=1280 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2412 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Jul 10 00:47:01.360000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2412 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Jul 10 00:47:01.360000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2412 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Jul 10 00:47:01.360000 audit[1280]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=e a1=aaab020a2700 a2=10 a3=0 items=0 ppid=1 pid=1280 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:47:01.360000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Jul 10 00:47:01.360000 audit[1280]: AVC avc: denied { watch_reads } for pid=1280 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2412 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Jul 10 00:47:01.360000 audit[1280]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=e a1=aaab020a2700 a2=10 a3=0 items=0 ppid=1 pid=1280 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:47:01.360000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Jul 10 00:47:01.360000 audit[1280]: AVC avc: denied { watch_reads } for pid=1280 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2412 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Jul 10 00:47:01.360000 audit[1280]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=e a1=aaab020a2700 a2=10 a3=0 items=0 ppid=1 pid=1280 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:47:01.360000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Jul 10 00:47:01.379336 env[1213]: time="2025-07-10T00:47:01.379290289Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:f286dd84-9350-451a-abcb-aa977b59f4d9,Namespace:default,Attempt:0,}" Jul 10 00:47:01.497523 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Jul 10 00:47:01.497664 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali5ec59c6bf6e: link becomes ready Jul 10 00:47:01.495683 systemd-networkd[1043]: cali5ec59c6bf6e: Link UP Jul 10 00:47:01.497535 systemd-networkd[1043]: cali5ec59c6bf6e: Gained carrier Jul 10 00:47:01.507228 env[1213]: 2025-07-10 00:47:01.428 [INFO][2883] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.0.0.135-k8s-test--pod--1-eth0 default f286dd84-9350-451a-abcb-aa977b59f4d9 1379 0 2025-07-10 00:46:51 +0000 UTC map[projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 10.0.0.135 test-pod-1 eth0 default [] [] [kns.default ksa.default.default] cali5ec59c6bf6e [] [] }} ContainerID="d4aea6dcfdd1c84c1b8827f94b20f7f509d8f5909f8adfa4ce7514ade001334e" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.135-k8s-test--pod--1-" Jul 10 00:47:01.507228 env[1213]: 2025-07-10 00:47:01.428 [INFO][2883] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="d4aea6dcfdd1c84c1b8827f94b20f7f509d8f5909f8adfa4ce7514ade001334e" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.135-k8s-test--pod--1-eth0" Jul 10 00:47:01.507228 env[1213]: 2025-07-10 00:47:01.453 [INFO][2897] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="d4aea6dcfdd1c84c1b8827f94b20f7f509d8f5909f8adfa4ce7514ade001334e" HandleID="k8s-pod-network.d4aea6dcfdd1c84c1b8827f94b20f7f509d8f5909f8adfa4ce7514ade001334e" Workload="10.0.0.135-k8s-test--pod--1-eth0" Jul 10 00:47:01.507228 env[1213]: 2025-07-10 00:47:01.453 [INFO][2897] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="d4aea6dcfdd1c84c1b8827f94b20f7f509d8f5909f8adfa4ce7514ade001334e" HandleID="k8s-pod-network.d4aea6dcfdd1c84c1b8827f94b20f7f509d8f5909f8adfa4ce7514ade001334e" Workload="10.0.0.135-k8s-test--pod--1-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x400004cfb0), Attrs:map[string]string{"namespace":"default", "node":"10.0.0.135", "pod":"test-pod-1", "timestamp":"2025-07-10 00:47:01.452997376 +0000 UTC"}, Hostname:"10.0.0.135", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Jul 10 00:47:01.507228 env[1213]: 2025-07-10 00:47:01.453 [INFO][2897] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Jul 10 00:47:01.507228 env[1213]: 2025-07-10 00:47:01.453 [INFO][2897] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Jul 10 00:47:01.507228 env[1213]: 2025-07-10 00:47:01.453 [INFO][2897] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.0.0.135' Jul 10 00:47:01.507228 env[1213]: 2025-07-10 00:47:01.463 [INFO][2897] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.d4aea6dcfdd1c84c1b8827f94b20f7f509d8f5909f8adfa4ce7514ade001334e" host="10.0.0.135" Jul 10 00:47:01.507228 env[1213]: 2025-07-10 00:47:01.469 [INFO][2897] ipam/ipam.go 394: Looking up existing affinities for host host="10.0.0.135" Jul 10 00:47:01.507228 env[1213]: 2025-07-10 00:47:01.475 [INFO][2897] ipam/ipam.go 511: Trying affinity for 192.168.36.128/26 host="10.0.0.135" Jul 10 00:47:01.507228 env[1213]: 2025-07-10 00:47:01.476 [INFO][2897] ipam/ipam.go 158: Attempting to load block cidr=192.168.36.128/26 host="10.0.0.135" Jul 10 00:47:01.507228 env[1213]: 2025-07-10 00:47:01.479 [INFO][2897] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.36.128/26 host="10.0.0.135" Jul 10 00:47:01.507228 env[1213]: 2025-07-10 00:47:01.479 [INFO][2897] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.36.128/26 handle="k8s-pod-network.d4aea6dcfdd1c84c1b8827f94b20f7f509d8f5909f8adfa4ce7514ade001334e" host="10.0.0.135" Jul 10 00:47:01.507228 env[1213]: 2025-07-10 00:47:01.480 [INFO][2897] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.d4aea6dcfdd1c84c1b8827f94b20f7f509d8f5909f8adfa4ce7514ade001334e Jul 10 00:47:01.507228 env[1213]: 2025-07-10 00:47:01.485 [INFO][2897] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.36.128/26 handle="k8s-pod-network.d4aea6dcfdd1c84c1b8827f94b20f7f509d8f5909f8adfa4ce7514ade001334e" host="10.0.0.135" Jul 10 00:47:01.507228 env[1213]: 2025-07-10 00:47:01.490 [INFO][2897] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.36.132/26] block=192.168.36.128/26 handle="k8s-pod-network.d4aea6dcfdd1c84c1b8827f94b20f7f509d8f5909f8adfa4ce7514ade001334e" host="10.0.0.135" Jul 10 00:47:01.507228 env[1213]: 2025-07-10 00:47:01.491 [INFO][2897] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.36.132/26] handle="k8s-pod-network.d4aea6dcfdd1c84c1b8827f94b20f7f509d8f5909f8adfa4ce7514ade001334e" host="10.0.0.135" Jul 10 00:47:01.507228 env[1213]: 2025-07-10 00:47:01.491 [INFO][2897] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Jul 10 00:47:01.507228 env[1213]: 2025-07-10 00:47:01.491 [INFO][2897] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.36.132/26] IPv6=[] ContainerID="d4aea6dcfdd1c84c1b8827f94b20f7f509d8f5909f8adfa4ce7514ade001334e" HandleID="k8s-pod-network.d4aea6dcfdd1c84c1b8827f94b20f7f509d8f5909f8adfa4ce7514ade001334e" Workload="10.0.0.135-k8s-test--pod--1-eth0" Jul 10 00:47:01.507228 env[1213]: 2025-07-10 00:47:01.492 [INFO][2883] cni-plugin/k8s.go 418: Populated endpoint ContainerID="d4aea6dcfdd1c84c1b8827f94b20f7f509d8f5909f8adfa4ce7514ade001334e" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.135-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.135-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"f286dd84-9350-451a-abcb-aa977b59f4d9", ResourceVersion:"1379", Generation:0, CreationTimestamp:time.Date(2025, time.July, 10, 0, 46, 51, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.135", ContainerID:"", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.36.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Jul 10 00:47:01.508052 env[1213]: 2025-07-10 00:47:01.492 [INFO][2883] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.36.132/32] ContainerID="d4aea6dcfdd1c84c1b8827f94b20f7f509d8f5909f8adfa4ce7514ade001334e" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.135-k8s-test--pod--1-eth0" Jul 10 00:47:01.508052 env[1213]: 2025-07-10 00:47:01.492 [INFO][2883] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali5ec59c6bf6e ContainerID="d4aea6dcfdd1c84c1b8827f94b20f7f509d8f5909f8adfa4ce7514ade001334e" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.135-k8s-test--pod--1-eth0" Jul 10 00:47:01.508052 env[1213]: 2025-07-10 00:47:01.498 [INFO][2883] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="d4aea6dcfdd1c84c1b8827f94b20f7f509d8f5909f8adfa4ce7514ade001334e" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.135-k8s-test--pod--1-eth0" Jul 10 00:47:01.508052 env[1213]: 2025-07-10 00:47:01.498 [INFO][2883] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="d4aea6dcfdd1c84c1b8827f94b20f7f509d8f5909f8adfa4ce7514ade001334e" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.135-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.135-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"f286dd84-9350-451a-abcb-aa977b59f4d9", ResourceVersion:"1379", Generation:0, CreationTimestamp:time.Date(2025, time.July, 10, 0, 46, 51, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.135", ContainerID:"d4aea6dcfdd1c84c1b8827f94b20f7f509d8f5909f8adfa4ce7514ade001334e", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.36.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"e6:ee:42:ae:39:bd", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Jul 10 00:47:01.508052 env[1213]: 2025-07-10 00:47:01.505 [INFO][2883] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="d4aea6dcfdd1c84c1b8827f94b20f7f509d8f5909f8adfa4ce7514ade001334e" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.135-k8s-test--pod--1-eth0" Jul 10 00:47:01.514000 audit[2917]: NETFILTER_CFG table=filter:91 family=2 entries=40 op=nft_register_chain pid=2917 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 10 00:47:01.518682 env[1213]: time="2025-07-10T00:47:01.518066364Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 10 00:47:01.518682 env[1213]: time="2025-07-10T00:47:01.518103370Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 10 00:47:01.518682 env[1213]: time="2025-07-10T00:47:01.518114132Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 10 00:47:01.518682 env[1213]: time="2025-07-10T00:47:01.518229870Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/d4aea6dcfdd1c84c1b8827f94b20f7f509d8f5909f8adfa4ce7514ade001334e pid=2922 runtime=io.containerd.runc.v2 Jul 10 00:47:01.519068 kernel: kauditd_printk_skb: 440 callbacks suppressed Jul 10 00:47:01.519128 kernel: audit: type=1325 audit(1752108421.514:785): table=filter:91 family=2 entries=40 op=nft_register_chain pid=2917 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 10 00:47:01.519153 kernel: audit: type=1300 audit(1752108421.514:785): arch=c00000b7 syscall=211 success=yes exit=20336 a0=3 a1=fffffa1718a0 a2=0 a3=ffff8f5fbfa8 items=0 ppid=2215 pid=2917 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:47:01.514000 audit[2917]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=20336 a0=3 a1=fffffa1718a0 a2=0 a3=ffff8f5fbfa8 items=0 ppid=2215 pid=2917 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:47:01.514000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 10 00:47:01.525062 kernel: audit: type=1327 audit(1752108421.514:785): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 10 00:47:01.534146 systemd[1]: Started cri-containerd-d4aea6dcfdd1c84c1b8827f94b20f7f509d8f5909f8adfa4ce7514ade001334e.scope. Jul 10 00:47:01.561000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:47:01.561000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:47:01.568773 kernel: audit: type=1400 audit(1752108421.561:786): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:47:01.568868 kernel: audit: type=1400 audit(1752108421.561:787): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:47:01.561000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:47:01.571567 kernel: audit: type=1400 audit(1752108421.561:788): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:47:01.561000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:47:01.574063 kernel: audit: type=1400 audit(1752108421.561:789): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:47:01.574137 kernel: audit: type=1400 audit(1752108421.561:790): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:47:01.561000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:47:01.574363 systemd-resolved[1154]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Jul 10 00:47:01.561000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:47:01.578843 kernel: audit: type=1400 audit(1752108421.561:791): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:47:01.578921 kernel: audit: type=1400 audit(1752108421.561:792): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:47:01.561000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:47:01.561000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:47:01.561000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:47:01.564000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:47:01.564000 audit: BPF prog-id=126 op=LOAD Jul 10 00:47:01.564000 audit[2932]: AVC avc: denied { bpf } for pid=2932 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:47:01.564000 audit[2932]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=2922 pid=2932 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:47:01.564000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6434616561366463666464316338346331623838323766393462323066 Jul 10 00:47:01.564000 audit[2932]: AVC avc: denied { perfmon } for pid=2932 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:47:01.564000 audit[2932]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2922 pid=2932 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:47:01.564000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6434616561366463666464316338346331623838323766393462323066 Jul 10 00:47:01.564000 audit[2932]: AVC avc: denied { bpf } for pid=2932 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:47:01.564000 audit[2932]: AVC avc: denied { bpf } for pid=2932 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:47:01.564000 audit[2932]: AVC avc: denied { bpf } for pid=2932 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:47:01.564000 audit[2932]: AVC avc: denied { perfmon } for pid=2932 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:47:01.564000 audit[2932]: AVC avc: denied { perfmon } for pid=2932 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:47:01.564000 audit[2932]: AVC avc: denied { perfmon } for pid=2932 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:47:01.564000 audit[2932]: AVC avc: denied { perfmon } for pid=2932 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:47:01.564000 audit[2932]: AVC avc: denied { perfmon } for pid=2932 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:47:01.564000 audit[2932]: AVC avc: denied { bpf } for pid=2932 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:47:01.564000 audit[2932]: AVC avc: denied { bpf } for pid=2932 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:47:01.564000 audit: BPF prog-id=127 op=LOAD Jul 10 00:47:01.564000 audit[2932]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2922 pid=2932 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:47:01.564000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6434616561366463666464316338346331623838323766393462323066 Jul 10 00:47:01.567000 audit[2932]: AVC avc: denied { bpf } for pid=2932 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:47:01.567000 audit[2932]: AVC avc: denied { bpf } for pid=2932 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:47:01.567000 audit[2932]: AVC avc: denied { perfmon } for pid=2932 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:47:01.567000 audit[2932]: AVC avc: denied { perfmon } for pid=2932 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:47:01.567000 audit[2932]: AVC avc: denied { perfmon } for pid=2932 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:47:01.567000 audit[2932]: AVC avc: denied { perfmon } for pid=2932 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:47:01.567000 audit[2932]: AVC avc: denied { perfmon } for pid=2932 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:47:01.567000 audit[2932]: AVC avc: denied { bpf } for pid=2932 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:47:01.567000 audit[2932]: AVC avc: denied { bpf } for pid=2932 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:47:01.567000 audit: BPF prog-id=128 op=LOAD Jul 10 00:47:01.567000 audit[2932]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2922 pid=2932 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:47:01.567000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6434616561366463666464316338346331623838323766393462323066 Jul 10 00:47:01.567000 audit: BPF prog-id=128 op=UNLOAD Jul 10 00:47:01.567000 audit: BPF prog-id=127 op=UNLOAD Jul 10 00:47:01.567000 audit[2932]: AVC avc: denied { bpf } for pid=2932 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:47:01.567000 audit[2932]: AVC avc: denied { bpf } for pid=2932 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:47:01.567000 audit[2932]: AVC avc: denied { bpf } for pid=2932 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:47:01.567000 audit[2932]: AVC avc: denied { perfmon } for pid=2932 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:47:01.567000 audit[2932]: AVC avc: denied { perfmon } for pid=2932 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:47:01.567000 audit[2932]: AVC avc: denied { perfmon } for pid=2932 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:47:01.567000 audit[2932]: AVC avc: denied { perfmon } for pid=2932 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:47:01.567000 audit[2932]: AVC avc: denied { perfmon } for pid=2932 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:47:01.567000 audit[2932]: AVC avc: denied { bpf } for pid=2932 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:47:01.567000 audit[2932]: AVC avc: denied { bpf } for pid=2932 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:47:01.567000 audit: BPF prog-id=129 op=LOAD Jul 10 00:47:01.567000 audit[2932]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2922 pid=2932 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:47:01.567000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6434616561366463666464316338346331623838323766393462323066 Jul 10 00:47:01.598669 env[1213]: time="2025-07-10T00:47:01.598629826Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:f286dd84-9350-451a-abcb-aa977b59f4d9,Namespace:default,Attempt:0,} returns sandbox id \"d4aea6dcfdd1c84c1b8827f94b20f7f509d8f5909f8adfa4ce7514ade001334e\"" Jul 10 00:47:01.600112 env[1213]: time="2025-07-10T00:47:01.600084978Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" Jul 10 00:47:01.815905 env[1213]: time="2025-07-10T00:47:01.815863186Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 10 00:47:01.818355 env[1213]: time="2025-07-10T00:47:01.817303816Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:cd8b38a4e22587134e82fff3512a99b84799274d989a1ec20f58c7f8c89b8511,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 10 00:47:01.819487 env[1213]: time="2025-07-10T00:47:01.819454479Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 10 00:47:01.821306 env[1213]: time="2025-07-10T00:47:01.821273930Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx@sha256:30bb68e656e0665bce700e67d2756f68bdca3345fa1099a32bfdb8febcf621cd,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 10 00:47:01.823011 env[1213]: time="2025-07-10T00:47:01.822974681Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:cd8b38a4e22587134e82fff3512a99b84799274d989a1ec20f58c7f8c89b8511\"" Jul 10 00:47:01.827015 env[1213]: time="2025-07-10T00:47:01.826979881Z" level=info msg="CreateContainer within sandbox \"d4aea6dcfdd1c84c1b8827f94b20f7f509d8f5909f8adfa4ce7514ade001334e\" for container &ContainerMetadata{Name:test,Attempt:0,}" Jul 10 00:47:01.837419 env[1213]: time="2025-07-10T00:47:01.837373620Z" level=info msg="CreateContainer within sandbox \"d4aea6dcfdd1c84c1b8827f94b20f7f509d8f5909f8adfa4ce7514ade001334e\" for &ContainerMetadata{Name:test,Attempt:0,} returns container id \"31daecb83bab9ae98bd8ddb7bfd015736f49e3a101cab0f61d5ffd67476f486e\"" Jul 10 00:47:01.838018 env[1213]: time="2025-07-10T00:47:01.837986118Z" level=info msg="StartContainer for \"31daecb83bab9ae98bd8ddb7bfd015736f49e3a101cab0f61d5ffd67476f486e\"" Jul 10 00:47:01.851407 systemd[1]: Started cri-containerd-31daecb83bab9ae98bd8ddb7bfd015736f49e3a101cab0f61d5ffd67476f486e.scope. Jul 10 00:47:01.872000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:47:01.872000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:47:01.872000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:47:01.872000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:47:01.872000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:47:01.872000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:47:01.872000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:47:01.872000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:47:01.872000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:47:01.872000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:47:01.872000 audit: BPF prog-id=130 op=LOAD Jul 10 00:47:01.872000 audit[2965]: AVC avc: denied { bpf } for pid=2965 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:47:01.872000 audit[2965]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=2922 pid=2965 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:47:01.872000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3331646165636238336261623961653938626438646462376266643031 Jul 10 00:47:01.872000 audit[2965]: AVC avc: denied { perfmon } for pid=2965 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:47:01.872000 audit[2965]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2922 pid=2965 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:47:01.872000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3331646165636238336261623961653938626438646462376266643031 Jul 10 00:47:01.872000 audit[2965]: AVC avc: denied { bpf } for pid=2965 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:47:01.872000 audit[2965]: AVC avc: denied { bpf } for pid=2965 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:47:01.872000 audit[2965]: AVC avc: denied { bpf } for pid=2965 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:47:01.872000 audit[2965]: AVC avc: denied { perfmon } for pid=2965 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:47:01.872000 audit[2965]: AVC avc: denied { perfmon } for pid=2965 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:47:01.872000 audit[2965]: AVC avc: denied { perfmon } for pid=2965 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:47:01.872000 audit[2965]: AVC avc: denied { perfmon } for pid=2965 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:47:01.872000 audit[2965]: AVC avc: denied { perfmon } for pid=2965 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:47:01.872000 audit[2965]: AVC avc: denied { bpf } for pid=2965 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:47:01.872000 audit[2965]: AVC avc: denied { bpf } for pid=2965 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:47:01.872000 audit: BPF prog-id=131 op=LOAD Jul 10 00:47:01.872000 audit[2965]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=2922 pid=2965 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:47:01.872000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3331646165636238336261623961653938626438646462376266643031 Jul 10 00:47:01.872000 audit[2965]: AVC avc: denied { bpf } for pid=2965 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:47:01.872000 audit[2965]: AVC avc: denied { bpf } for pid=2965 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:47:01.872000 audit[2965]: AVC avc: denied { perfmon } for pid=2965 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:47:01.872000 audit[2965]: AVC avc: denied { perfmon } for pid=2965 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:47:01.872000 audit[2965]: AVC avc: denied { perfmon } for pid=2965 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:47:01.872000 audit[2965]: AVC avc: denied { perfmon } for pid=2965 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:47:01.872000 audit[2965]: AVC avc: denied { perfmon } for pid=2965 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:47:01.872000 audit[2965]: AVC avc: denied { bpf } for pid=2965 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:47:01.872000 audit[2965]: AVC avc: denied { bpf } for pid=2965 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:47:01.872000 audit: BPF prog-id=132 op=LOAD Jul 10 00:47:01.872000 audit[2965]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=2922 pid=2965 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:47:01.872000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3331646165636238336261623961653938626438646462376266643031 Jul 10 00:47:01.873000 audit: BPF prog-id=132 op=UNLOAD Jul 10 00:47:01.873000 audit: BPF prog-id=131 op=UNLOAD Jul 10 00:47:01.873000 audit[2965]: AVC avc: denied { bpf } for pid=2965 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:47:01.873000 audit[2965]: AVC avc: denied { bpf } for pid=2965 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:47:01.873000 audit[2965]: AVC avc: denied { bpf } for pid=2965 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:47:01.873000 audit[2965]: AVC avc: denied { perfmon } for pid=2965 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:47:01.873000 audit[2965]: AVC avc: denied { perfmon } for pid=2965 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:47:01.873000 audit[2965]: AVC avc: denied { perfmon } for pid=2965 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:47:01.873000 audit[2965]: AVC avc: denied { perfmon } for pid=2965 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:47:01.873000 audit[2965]: AVC avc: denied { perfmon } for pid=2965 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:47:01.873000 audit[2965]: AVC avc: denied { bpf } for pid=2965 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:47:01.873000 audit[2965]: AVC avc: denied { bpf } for pid=2965 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:47:01.873000 audit: BPF prog-id=133 op=LOAD Jul 10 00:47:01.873000 audit[2965]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=2922 pid=2965 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:47:01.873000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3331646165636238336261623961653938626438646462376266643031 Jul 10 00:47:01.888921 env[1213]: time="2025-07-10T00:47:01.888857199Z" level=info msg="StartContainer for \"31daecb83bab9ae98bd8ddb7bfd015736f49e3a101cab0f61d5ffd67476f486e\" returns successfully" Jul 10 00:47:02.090582 kubelet[1452]: E0710 00:47:02.090459 1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 00:47:02.610627 systemd-networkd[1043]: cali5ec59c6bf6e: Gained IPv6LL Jul 10 00:47:03.090899 kubelet[1452]: E0710 00:47:03.090852 1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 00:47:04.092021 kubelet[1452]: E0710 00:47:04.091970 1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 00:47:04.999454 update_engine[1208]: I0710 00:47:04.999004 1208 update_attempter.cc:509] Updating boot flags... Jul 10 00:47:05.092966 kubelet[1452]: E0710 00:47:05.092925 1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 00:47:06.093252 kubelet[1452]: E0710 00:47:06.093211 1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 00:47:07.069865 kubelet[1452]: E0710 00:47:07.069811 1452 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 00:47:07.094316 kubelet[1452]: E0710 00:47:07.094272 1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 00:47:08.094550 kubelet[1452]: E0710 00:47:08.094485 1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"