Jul 11 00:46:53.746923 kernel: Booting Linux on physical CPU 0x0000000000 [0x413fd0c1] Jul 11 00:46:53.746941 kernel: Linux version 5.15.186-flatcar (build@pony-truck.infra.kinvolk.io) (aarch64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP PREEMPT Thu Jul 10 23:22:35 -00 2025 Jul 11 00:46:53.746949 kernel: efi: EFI v2.70 by EDK II Jul 11 00:46:53.746955 kernel: efi: SMBIOS 3.0=0xd9260000 ACPI 2.0=0xd9240000 MEMATTR=0xda32b018 RNG=0xd9220018 MEMRESERVE=0xd9521c18 Jul 11 00:46:53.746959 kernel: random: crng init done Jul 11 00:46:53.746965 kernel: ACPI: Early table checksum verification disabled Jul 11 00:46:53.746971 kernel: ACPI: RSDP 0x00000000D9240000 000024 (v02 BOCHS ) Jul 11 00:46:53.746978 kernel: ACPI: XSDT 0x00000000D9230000 000064 (v01 BOCHS BXPC 00000001 01000013) Jul 11 00:46:53.746983 kernel: ACPI: FACP 0x00000000D91E0000 000114 (v06 BOCHS BXPC 00000001 BXPC 00000001) Jul 11 00:46:53.746988 kernel: ACPI: DSDT 0x00000000D91F0000 0014A2 (v02 BOCHS BXPC 00000001 BXPC 00000001) Jul 11 00:46:53.746994 kernel: ACPI: APIC 0x00000000D91D0000 0001A8 (v04 BOCHS BXPC 00000001 BXPC 00000001) Jul 11 00:46:53.746999 kernel: ACPI: PPTT 0x00000000D91C0000 00009C (v02 BOCHS BXPC 00000001 BXPC 00000001) Jul 11 00:46:53.747004 kernel: ACPI: GTDT 0x00000000D91B0000 000060 (v02 BOCHS BXPC 00000001 BXPC 00000001) Jul 11 00:46:53.747010 kernel: ACPI: MCFG 0x00000000D91A0000 00003C (v01 BOCHS BXPC 00000001 BXPC 00000001) Jul 11 00:46:53.747017 kernel: ACPI: SPCR 0x00000000D9190000 000050 (v02 BOCHS BXPC 00000001 BXPC 00000001) Jul 11 00:46:53.747023 kernel: ACPI: DBG2 0x00000000D9180000 000057 (v00 BOCHS BXPC 00000001 BXPC 00000001) Jul 11 00:46:53.747029 kernel: ACPI: IORT 0x00000000D9170000 000080 (v03 BOCHS BXPC 00000001 BXPC 00000001) Jul 11 00:46:53.747035 kernel: ACPI: SPCR: console: pl011,mmio,0x9000000,9600 Jul 11 00:46:53.747041 kernel: NUMA: Failed to initialise from firmware Jul 11 00:46:53.747047 kernel: NUMA: Faking a node at [mem 0x0000000040000000-0x00000000dcffffff] Jul 11 00:46:53.747052 kernel: NUMA: NODE_DATA [mem 0xdcb0b900-0xdcb10fff] Jul 11 00:46:53.747058 kernel: Zone ranges: Jul 11 00:46:53.747063 kernel: DMA [mem 0x0000000040000000-0x00000000dcffffff] Jul 11 00:46:53.747070 kernel: DMA32 empty Jul 11 00:46:53.747075 kernel: Normal empty Jul 11 00:46:53.747081 kernel: Movable zone start for each node Jul 11 00:46:53.747086 kernel: Early memory node ranges Jul 11 00:46:53.747092 kernel: node 0: [mem 0x0000000040000000-0x00000000d924ffff] Jul 11 00:46:53.747097 kernel: node 0: [mem 0x00000000d9250000-0x00000000d951ffff] Jul 11 00:46:53.747103 kernel: node 0: [mem 0x00000000d9520000-0x00000000dc7fffff] Jul 11 00:46:53.749318 kernel: node 0: [mem 0x00000000dc800000-0x00000000dc88ffff] Jul 11 00:46:53.749327 kernel: node 0: [mem 0x00000000dc890000-0x00000000dc89ffff] Jul 11 00:46:53.749334 kernel: node 0: [mem 0x00000000dc8a0000-0x00000000dc9bffff] Jul 11 00:46:53.749340 kernel: node 0: [mem 0x00000000dc9c0000-0x00000000dcffffff] Jul 11 00:46:53.749346 kernel: Initmem setup node 0 [mem 0x0000000040000000-0x00000000dcffffff] Jul 11 00:46:53.749357 kernel: On node 0, zone DMA: 12288 pages in unavailable ranges Jul 11 00:46:53.749363 kernel: psci: probing for conduit method from ACPI. Jul 11 00:46:53.749368 kernel: psci: PSCIv1.1 detected in firmware. Jul 11 00:46:53.749374 kernel: psci: Using standard PSCI v0.2 function IDs Jul 11 00:46:53.749380 kernel: psci: Trusted OS migration not required Jul 11 00:46:53.749388 kernel: psci: SMC Calling Convention v1.1 Jul 11 00:46:53.749395 kernel: smccc: KVM: hypervisor services detected (0x00000000 0x00000000 0x00000000 0x00000003) Jul 11 00:46:53.749402 kernel: ACPI: SRAT not present Jul 11 00:46:53.749409 kernel: percpu: Embedded 30 pages/cpu s82968 r8192 d31720 u122880 Jul 11 00:46:53.749415 kernel: pcpu-alloc: s82968 r8192 d31720 u122880 alloc=30*4096 Jul 11 00:46:53.749421 kernel: pcpu-alloc: [0] 0 [0] 1 [0] 2 [0] 3 Jul 11 00:46:53.749427 kernel: Detected PIPT I-cache on CPU0 Jul 11 00:46:53.749433 kernel: CPU features: detected: GIC system register CPU interface Jul 11 00:46:53.749440 kernel: CPU features: detected: Hardware dirty bit management Jul 11 00:46:53.749446 kernel: CPU features: detected: Spectre-v4 Jul 11 00:46:53.749452 kernel: CPU features: detected: Spectre-BHB Jul 11 00:46:53.749459 kernel: CPU features: kernel page table isolation forced ON by KASLR Jul 11 00:46:53.749465 kernel: CPU features: detected: Kernel page table isolation (KPTI) Jul 11 00:46:53.749471 kernel: CPU features: detected: ARM erratum 1418040 Jul 11 00:46:53.749477 kernel: CPU features: detected: SSBS not fully self-synchronizing Jul 11 00:46:53.749483 kernel: Built 1 zonelists, mobility grouping on. Total pages: 633024 Jul 11 00:46:53.749489 kernel: Policy zone: DMA Jul 11 00:46:53.749497 kernel: Kernel command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected acpi=force verity.usrhash=8fd3ef416118421b63f30b3d02e5d4feea39e34704e91050cdad11fae31df42c Jul 11 00:46:53.749504 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Jul 11 00:46:53.749510 kernel: Dentry cache hash table entries: 524288 (order: 10, 4194304 bytes, linear) Jul 11 00:46:53.749516 kernel: Inode-cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) Jul 11 00:46:53.749522 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Jul 11 00:46:53.749530 kernel: Memory: 2457340K/2572288K available (9792K kernel code, 2094K rwdata, 7588K rodata, 36416K init, 777K bss, 114948K reserved, 0K cma-reserved) Jul 11 00:46:53.749536 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=4, Nodes=1 Jul 11 00:46:53.749542 kernel: trace event string verifier disabled Jul 11 00:46:53.749548 kernel: rcu: Preemptible hierarchical RCU implementation. Jul 11 00:46:53.749555 kernel: rcu: RCU event tracing is enabled. Jul 11 00:46:53.749561 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=4. Jul 11 00:46:53.749567 kernel: Trampoline variant of Tasks RCU enabled. Jul 11 00:46:53.749574 kernel: Tracing variant of Tasks RCU enabled. Jul 11 00:46:53.749580 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Jul 11 00:46:53.750076 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=4 Jul 11 00:46:53.750092 kernel: NR_IRQS: 64, nr_irqs: 64, preallocated irqs: 0 Jul 11 00:46:53.750102 kernel: GICv3: 256 SPIs implemented Jul 11 00:46:53.750179 kernel: GICv3: 0 Extended SPIs implemented Jul 11 00:46:53.750187 kernel: GICv3: Distributor has no Range Selector support Jul 11 00:46:53.750193 kernel: Root IRQ handler: gic_handle_irq Jul 11 00:46:53.750199 kernel: GICv3: 16 PPIs implemented Jul 11 00:46:53.750205 kernel: GICv3: CPU0: found redistributor 0 region 0:0x00000000080a0000 Jul 11 00:46:53.750212 kernel: ACPI: SRAT not present Jul 11 00:46:53.750218 kernel: ITS [mem 0x08080000-0x0809ffff] Jul 11 00:46:53.750224 kernel: ITS@0x0000000008080000: allocated 8192 Devices @400b0000 (indirect, esz 8, psz 64K, shr 1) Jul 11 00:46:53.750230 kernel: ITS@0x0000000008080000: allocated 8192 Interrupt Collections @400c0000 (flat, esz 8, psz 64K, shr 1) Jul 11 00:46:53.750237 kernel: GICv3: using LPI property table @0x00000000400d0000 Jul 11 00:46:53.750243 kernel: GICv3: CPU0: using allocated LPI pending table @0x00000000400e0000 Jul 11 00:46:53.750253 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Jul 11 00:46:53.750259 kernel: arch_timer: cp15 timer(s) running at 25.00MHz (virt). Jul 11 00:46:53.750265 kernel: clocksource: arch_sys_counter: mask: 0xffffffffffffff max_cycles: 0x5c40939b5, max_idle_ns: 440795202646 ns Jul 11 00:46:53.750271 kernel: sched_clock: 56 bits at 25MHz, resolution 40ns, wraps every 4398046511100ns Jul 11 00:46:53.750277 kernel: arm-pv: using stolen time PV Jul 11 00:46:53.750284 kernel: Console: colour dummy device 80x25 Jul 11 00:46:53.750290 kernel: ACPI: Core revision 20210730 Jul 11 00:46:53.750296 kernel: Calibrating delay loop (skipped), value calculated using timer frequency.. 50.00 BogoMIPS (lpj=25000) Jul 11 00:46:53.750303 kernel: pid_max: default: 32768 minimum: 301 Jul 11 00:46:53.750310 kernel: LSM: Security Framework initializing Jul 11 00:46:53.750317 kernel: SELinux: Initializing. Jul 11 00:46:53.750324 kernel: Mount-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) Jul 11 00:46:53.750331 kernel: Mountpoint-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) Jul 11 00:46:53.750337 kernel: rcu: Hierarchical SRCU implementation. Jul 11 00:46:53.750343 kernel: Platform MSI: ITS@0x8080000 domain created Jul 11 00:46:53.750350 kernel: PCI/MSI: ITS@0x8080000 domain created Jul 11 00:46:53.750356 kernel: Remapping and enabling EFI services. Jul 11 00:46:53.750362 kernel: smp: Bringing up secondary CPUs ... Jul 11 00:46:53.750368 kernel: Detected PIPT I-cache on CPU1 Jul 11 00:46:53.750376 kernel: GICv3: CPU1: found redistributor 1 region 0:0x00000000080c0000 Jul 11 00:46:53.750382 kernel: GICv3: CPU1: using allocated LPI pending table @0x00000000400f0000 Jul 11 00:46:53.750389 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Jul 11 00:46:53.750395 kernel: CPU1: Booted secondary processor 0x0000000001 [0x413fd0c1] Jul 11 00:46:53.750401 kernel: Detected PIPT I-cache on CPU2 Jul 11 00:46:53.750408 kernel: GICv3: CPU2: found redistributor 2 region 0:0x00000000080e0000 Jul 11 00:46:53.750414 kernel: GICv3: CPU2: using allocated LPI pending table @0x0000000040100000 Jul 11 00:46:53.750420 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Jul 11 00:46:53.750426 kernel: CPU2: Booted secondary processor 0x0000000002 [0x413fd0c1] Jul 11 00:46:53.750433 kernel: Detected PIPT I-cache on CPU3 Jul 11 00:46:53.750894 kernel: GICv3: CPU3: found redistributor 3 region 0:0x0000000008100000 Jul 11 00:46:53.750910 kernel: GICv3: CPU3: using allocated LPI pending table @0x0000000040110000 Jul 11 00:46:53.750916 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Jul 11 00:46:53.750923 kernel: CPU3: Booted secondary processor 0x0000000003 [0x413fd0c1] Jul 11 00:46:53.750936 kernel: smp: Brought up 1 node, 4 CPUs Jul 11 00:46:53.750943 kernel: SMP: Total of 4 processors activated. Jul 11 00:46:53.750950 kernel: CPU features: detected: 32-bit EL0 Support Jul 11 00:46:53.750957 kernel: CPU features: detected: Data cache clean to the PoU not required for I/D coherence Jul 11 00:46:53.750963 kernel: CPU features: detected: Common not Private translations Jul 11 00:46:53.750970 kernel: CPU features: detected: CRC32 instructions Jul 11 00:46:53.750977 kernel: CPU features: detected: RCpc load-acquire (LDAPR) Jul 11 00:46:53.750983 kernel: CPU features: detected: LSE atomic instructions Jul 11 00:46:53.750992 kernel: CPU features: detected: Privileged Access Never Jul 11 00:46:53.750998 kernel: CPU features: detected: RAS Extension Support Jul 11 00:46:53.751005 kernel: CPU features: detected: Speculative Store Bypassing Safe (SSBS) Jul 11 00:46:53.751011 kernel: CPU: All CPU(s) started at EL1 Jul 11 00:46:53.751018 kernel: alternatives: patching kernel code Jul 11 00:46:53.751026 kernel: devtmpfs: initialized Jul 11 00:46:53.751032 kernel: KASLR enabled Jul 11 00:46:53.751039 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Jul 11 00:46:53.751046 kernel: futex hash table entries: 1024 (order: 4, 65536 bytes, linear) Jul 11 00:46:53.751052 kernel: pinctrl core: initialized pinctrl subsystem Jul 11 00:46:53.751059 kernel: SMBIOS 3.0.0 present. Jul 11 00:46:53.751065 kernel: DMI: QEMU KVM Virtual Machine, BIOS 0.0.0 02/06/2015 Jul 11 00:46:53.751072 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Jul 11 00:46:53.751078 kernel: DMA: preallocated 512 KiB GFP_KERNEL pool for atomic allocations Jul 11 00:46:53.751086 kernel: DMA: preallocated 512 KiB GFP_KERNEL|GFP_DMA pool for atomic allocations Jul 11 00:46:53.751093 kernel: DMA: preallocated 512 KiB GFP_KERNEL|GFP_DMA32 pool for atomic allocations Jul 11 00:46:53.751100 kernel: audit: initializing netlink subsys (disabled) Jul 11 00:46:53.751141 kernel: audit: type=2000 audit(0.031:1): state=initialized audit_enabled=0 res=1 Jul 11 00:46:53.751149 kernel: thermal_sys: Registered thermal governor 'step_wise' Jul 11 00:46:53.751156 kernel: cpuidle: using governor menu Jul 11 00:46:53.751163 kernel: hw-breakpoint: found 6 breakpoint and 4 watchpoint registers. Jul 11 00:46:53.751170 kernel: ASID allocator initialised with 32768 entries Jul 11 00:46:53.751176 kernel: ACPI: bus type PCI registered Jul 11 00:46:53.751186 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Jul 11 00:46:53.751192 kernel: Serial: AMBA PL011 UART driver Jul 11 00:46:53.751199 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Jul 11 00:46:53.751205 kernel: HugeTLB registered 32.0 MiB page size, pre-allocated 0 pages Jul 11 00:46:53.751212 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Jul 11 00:46:53.751219 kernel: HugeTLB registered 64.0 KiB page size, pre-allocated 0 pages Jul 11 00:46:53.751225 kernel: cryptd: max_cpu_qlen set to 1000 Jul 11 00:46:53.751232 kernel: alg: No test for fips(ansi_cprng) (fips_ansi_cprng) Jul 11 00:46:53.751239 kernel: ACPI: Added _OSI(Module Device) Jul 11 00:46:53.751246 kernel: ACPI: Added _OSI(Processor Device) Jul 11 00:46:53.751253 kernel: ACPI: Added _OSI(Processor Aggregator Device) Jul 11 00:46:53.751259 kernel: ACPI: Added _OSI(Linux-Dell-Video) Jul 11 00:46:53.751266 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Jul 11 00:46:53.751272 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Jul 11 00:46:53.751279 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded Jul 11 00:46:53.751285 kernel: ACPI: Interpreter enabled Jul 11 00:46:53.751292 kernel: ACPI: Using GIC for interrupt routing Jul 11 00:46:53.751299 kernel: ACPI: MCFG table detected, 1 entries Jul 11 00:46:53.751307 kernel: ARMH0011:00: ttyAMA0 at MMIO 0x9000000 (irq = 12, base_baud = 0) is a SBSA Jul 11 00:46:53.751313 kernel: printk: console [ttyAMA0] enabled Jul 11 00:46:53.751320 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff]) Jul 11 00:46:53.751445 kernel: acpi PNP0A08:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI HPX-Type3] Jul 11 00:46:53.751506 kernel: acpi PNP0A08:00: _OSC: platform does not support [LTR] Jul 11 00:46:53.751561 kernel: acpi PNP0A08:00: _OSC: OS now controls [PCIeHotplug PME AER PCIeCapability] Jul 11 00:46:53.751618 kernel: acpi PNP0A08:00: ECAM area [mem 0x4010000000-0x401fffffff] reserved by PNP0C02:00 Jul 11 00:46:53.751675 kernel: acpi PNP0A08:00: ECAM at [mem 0x4010000000-0x401fffffff] for [bus 00-ff] Jul 11 00:46:53.751684 kernel: ACPI: Remapped I/O 0x000000003eff0000 to [io 0x0000-0xffff window] Jul 11 00:46:53.751691 kernel: PCI host bridge to bus 0000:00 Jul 11 00:46:53.751753 kernel: pci_bus 0000:00: root bus resource [mem 0x10000000-0x3efeffff window] Jul 11 00:46:53.751805 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0xffff window] Jul 11 00:46:53.751855 kernel: pci_bus 0000:00: root bus resource [mem 0x8000000000-0xffffffffff window] Jul 11 00:46:53.751905 kernel: pci_bus 0000:00: root bus resource [bus 00-ff] Jul 11 00:46:53.751978 kernel: pci 0000:00:00.0: [1b36:0008] type 00 class 0x060000 Jul 11 00:46:53.752045 kernel: pci 0000:00:01.0: [1af4:1005] type 00 class 0x00ff00 Jul 11 00:46:53.752158 kernel: pci 0000:00:01.0: reg 0x10: [io 0x0000-0x001f] Jul 11 00:46:53.752238 kernel: pci 0000:00:01.0: reg 0x14: [mem 0x10000000-0x10000fff] Jul 11 00:46:53.752298 kernel: pci 0000:00:01.0: reg 0x20: [mem 0x8000000000-0x8000003fff 64bit pref] Jul 11 00:46:53.752355 kernel: pci 0000:00:01.0: BAR 4: assigned [mem 0x8000000000-0x8000003fff 64bit pref] Jul 11 00:46:53.752414 kernel: pci 0000:00:01.0: BAR 1: assigned [mem 0x10000000-0x10000fff] Jul 11 00:46:53.752476 kernel: pci 0000:00:01.0: BAR 0: assigned [io 0x1000-0x101f] Jul 11 00:46:53.752530 kernel: pci_bus 0000:00: resource 4 [mem 0x10000000-0x3efeffff window] Jul 11 00:46:53.752582 kernel: pci_bus 0000:00: resource 5 [io 0x0000-0xffff window] Jul 11 00:46:53.754423 kernel: pci_bus 0000:00: resource 6 [mem 0x8000000000-0xffffffffff window] Jul 11 00:46:53.754434 kernel: ACPI: PCI: Interrupt link GSI0 configured for IRQ 35 Jul 11 00:46:53.754442 kernel: ACPI: PCI: Interrupt link GSI1 configured for IRQ 36 Jul 11 00:46:53.754449 kernel: ACPI: PCI: Interrupt link GSI2 configured for IRQ 37 Jul 11 00:46:53.754455 kernel: ACPI: PCI: Interrupt link GSI3 configured for IRQ 38 Jul 11 00:46:53.754466 kernel: iommu: Default domain type: Translated Jul 11 00:46:53.754473 kernel: iommu: DMA domain TLB invalidation policy: strict mode Jul 11 00:46:53.754480 kernel: vgaarb: loaded Jul 11 00:46:53.754487 kernel: pps_core: LinuxPPS API ver. 1 registered Jul 11 00:46:53.754493 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Jul 11 00:46:53.754500 kernel: PTP clock support registered Jul 11 00:46:53.754506 kernel: Registered efivars operations Jul 11 00:46:53.754513 kernel: clocksource: Switched to clocksource arch_sys_counter Jul 11 00:46:53.754520 kernel: VFS: Disk quotas dquot_6.6.0 Jul 11 00:46:53.754528 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Jul 11 00:46:53.754535 kernel: pnp: PnP ACPI init Jul 11 00:46:53.754602 kernel: system 00:00: [mem 0x4010000000-0x401fffffff window] could not be reserved Jul 11 00:46:53.754613 kernel: pnp: PnP ACPI: found 1 devices Jul 11 00:46:53.754619 kernel: NET: Registered PF_INET protocol family Jul 11 00:46:53.754626 kernel: IP idents hash table entries: 65536 (order: 7, 524288 bytes, linear) Jul 11 00:46:53.754633 kernel: tcp_listen_portaddr_hash hash table entries: 2048 (order: 3, 32768 bytes, linear) Jul 11 00:46:53.754639 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Jul 11 00:46:53.754648 kernel: TCP established hash table entries: 32768 (order: 6, 262144 bytes, linear) Jul 11 00:46:53.754655 kernel: TCP bind hash table entries: 32768 (order: 7, 524288 bytes, linear) Jul 11 00:46:53.754662 kernel: TCP: Hash tables configured (established 32768 bind 32768) Jul 11 00:46:53.754669 kernel: UDP hash table entries: 2048 (order: 4, 65536 bytes, linear) Jul 11 00:46:53.754676 kernel: UDP-Lite hash table entries: 2048 (order: 4, 65536 bytes, linear) Jul 11 00:46:53.754683 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Jul 11 00:46:53.754689 kernel: PCI: CLS 0 bytes, default 64 Jul 11 00:46:53.754696 kernel: hw perfevents: enabled with armv8_pmuv3_0 PMU driver, 7 counters available Jul 11 00:46:53.754703 kernel: kvm [1]: HYP mode not available Jul 11 00:46:53.754711 kernel: Initialise system trusted keyrings Jul 11 00:46:53.754717 kernel: workingset: timestamp_bits=39 max_order=20 bucket_order=0 Jul 11 00:46:53.754724 kernel: Key type asymmetric registered Jul 11 00:46:53.754731 kernel: Asymmetric key parser 'x509' registered Jul 11 00:46:53.754737 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Jul 11 00:46:53.754744 kernel: io scheduler mq-deadline registered Jul 11 00:46:53.754750 kernel: io scheduler kyber registered Jul 11 00:46:53.754757 kernel: io scheduler bfq registered Jul 11 00:46:53.754764 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXSYBUS:00/PNP0C0C:00/input/input0 Jul 11 00:46:53.754772 kernel: ACPI: button: Power Button [PWRB] Jul 11 00:46:53.754779 kernel: ACPI: \_SB_.PCI0.GSI1: Enabled at IRQ 36 Jul 11 00:46:53.754840 kernel: virtio-pci 0000:00:01.0: enabling device (0005 -> 0007) Jul 11 00:46:53.754849 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Jul 11 00:46:53.754856 kernel: thunder_xcv, ver 1.0 Jul 11 00:46:53.754862 kernel: thunder_bgx, ver 1.0 Jul 11 00:46:53.754869 kernel: nicpf, ver 1.0 Jul 11 00:46:53.754876 kernel: nicvf, ver 1.0 Jul 11 00:46:53.754946 kernel: rtc-efi rtc-efi.0: registered as rtc0 Jul 11 00:46:53.755001 kernel: rtc-efi rtc-efi.0: setting system clock to 2025-07-11T00:46:53 UTC (1752194813) Jul 11 00:46:53.755010 kernel: hid: raw HID events driver (C) Jiri Kosina Jul 11 00:46:53.755016 kernel: NET: Registered PF_INET6 protocol family Jul 11 00:46:53.755023 kernel: Segment Routing with IPv6 Jul 11 00:46:53.755030 kernel: In-situ OAM (IOAM) with IPv6 Jul 11 00:46:53.755036 kernel: NET: Registered PF_PACKET protocol family Jul 11 00:46:53.755043 kernel: Key type dns_resolver registered Jul 11 00:46:53.755049 kernel: registered taskstats version 1 Jul 11 00:46:53.755057 kernel: Loading compiled-in X.509 certificates Jul 11 00:46:53.755064 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.186-flatcar: e29f2f0310c2b60e0457f826e7476605fb3b6ab2' Jul 11 00:46:53.755070 kernel: Key type .fscrypt registered Jul 11 00:46:53.755077 kernel: Key type fscrypt-provisioning registered Jul 11 00:46:53.755083 kernel: ima: No TPM chip found, activating TPM-bypass! Jul 11 00:46:53.755090 kernel: ima: Allocated hash algorithm: sha1 Jul 11 00:46:53.755096 kernel: ima: No architecture policies found Jul 11 00:46:53.755103 kernel: clk: Disabling unused clocks Jul 11 00:46:53.755139 kernel: Freeing unused kernel memory: 36416K Jul 11 00:46:53.755149 kernel: Run /init as init process Jul 11 00:46:53.755155 kernel: with arguments: Jul 11 00:46:53.755162 kernel: /init Jul 11 00:46:53.755168 kernel: with environment: Jul 11 00:46:53.755175 kernel: HOME=/ Jul 11 00:46:53.755181 kernel: TERM=linux Jul 11 00:46:53.755188 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Jul 11 00:46:53.755197 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Jul 11 00:46:53.755207 systemd[1]: Detected virtualization kvm. Jul 11 00:46:53.755214 systemd[1]: Detected architecture arm64. Jul 11 00:46:53.755220 systemd[1]: Running in initrd. Jul 11 00:46:53.755227 systemd[1]: No hostname configured, using default hostname. Jul 11 00:46:53.755234 systemd[1]: Hostname set to . Jul 11 00:46:53.755241 systemd[1]: Initializing machine ID from VM UUID. Jul 11 00:46:53.755248 systemd[1]: Queued start job for default target initrd.target. Jul 11 00:46:53.755255 systemd[1]: Started systemd-ask-password-console.path. Jul 11 00:46:53.755263 systemd[1]: Reached target cryptsetup.target. Jul 11 00:46:53.755270 systemd[1]: Reached target paths.target. Jul 11 00:46:53.755277 systemd[1]: Reached target slices.target. Jul 11 00:46:53.755284 systemd[1]: Reached target swap.target. Jul 11 00:46:53.755291 systemd[1]: Reached target timers.target. Jul 11 00:46:53.755298 systemd[1]: Listening on iscsid.socket. Jul 11 00:46:53.755305 systemd[1]: Listening on iscsiuio.socket. Jul 11 00:46:53.755313 systemd[1]: Listening on systemd-journald-audit.socket. Jul 11 00:46:53.755320 systemd[1]: Listening on systemd-journald-dev-log.socket. Jul 11 00:46:53.755327 systemd[1]: Listening on systemd-journald.socket. Jul 11 00:46:53.755334 systemd[1]: Listening on systemd-networkd.socket. Jul 11 00:46:53.755341 systemd[1]: Listening on systemd-udevd-control.socket. Jul 11 00:46:53.755348 systemd[1]: Listening on systemd-udevd-kernel.socket. Jul 11 00:46:53.755355 systemd[1]: Reached target sockets.target. Jul 11 00:46:53.755362 systemd[1]: Starting kmod-static-nodes.service... Jul 11 00:46:53.755369 systemd[1]: Finished network-cleanup.service. Jul 11 00:46:53.755377 systemd[1]: Starting systemd-fsck-usr.service... Jul 11 00:46:53.755384 systemd[1]: Starting systemd-journald.service... Jul 11 00:46:53.755391 systemd[1]: Starting systemd-modules-load.service... Jul 11 00:46:53.755398 systemd[1]: Starting systemd-resolved.service... Jul 11 00:46:53.755405 systemd[1]: Starting systemd-vconsole-setup.service... Jul 11 00:46:53.755412 systemd[1]: Finished kmod-static-nodes.service. Jul 11 00:46:53.755419 systemd[1]: Finished systemd-fsck-usr.service. Jul 11 00:46:53.755425 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Jul 11 00:46:53.755432 systemd[1]: Finished systemd-vconsole-setup.service. Jul 11 00:46:53.755440 systemd[1]: Starting dracut-cmdline-ask.service... Jul 11 00:46:53.755447 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Jul 11 00:46:53.755455 kernel: audit: type=1130 audit(1752194813.748:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 11 00:46:53.755465 systemd-journald[290]: Journal started Jul 11 00:46:53.755511 systemd-journald[290]: Runtime Journal (/run/log/journal/096908c649034ca5b536d8c54e94741e) is 6.0M, max 48.7M, 42.6M free. Jul 11 00:46:53.748000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 11 00:46:53.736050 systemd-modules-load[291]: Inserted module 'overlay' Jul 11 00:46:53.757721 systemd[1]: Started systemd-journald.service. Jul 11 00:46:53.758000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 11 00:46:53.764169 kernel: audit: type=1130 audit(1752194813.758:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 11 00:46:53.764824 systemd[1]: Finished dracut-cmdline-ask.service. Jul 11 00:46:53.771245 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Jul 11 00:46:53.771264 kernel: audit: type=1130 audit(1752194813.765:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 11 00:46:53.765000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 11 00:46:53.766442 systemd[1]: Starting dracut-cmdline.service... Jul 11 00:46:53.773261 kernel: Bridge firewalling registered Jul 11 00:46:53.772300 systemd-modules-load[291]: Inserted module 'br_netfilter' Jul 11 00:46:53.777620 dracut-cmdline[307]: dracut-dracut-053 Jul 11 00:46:53.780616 dracut-cmdline[307]: Using kernel command line parameters: rd.driver.pre=btrfs BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected acpi=force verity.usrhash=8fd3ef416118421b63f30b3d02e5d4feea39e34704e91050cdad11fae31df42c Jul 11 00:46:53.781689 systemd-resolved[292]: Positive Trust Anchors: Jul 11 00:46:53.781696 systemd-resolved[292]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Jul 11 00:46:53.788213 kernel: SCSI subsystem initialized Jul 11 00:46:53.781724 systemd-resolved[292]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Jul 11 00:46:53.787640 systemd-resolved[292]: Defaulting to hostname 'linux'. Jul 11 00:46:53.799533 kernel: audit: type=1130 audit(1752194813.793:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 11 00:46:53.799555 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Jul 11 00:46:53.799565 kernel: device-mapper: uevent: version 1.0.3 Jul 11 00:46:53.793000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 11 00:46:53.789888 systemd[1]: Started systemd-resolved.service. Jul 11 00:46:53.794022 systemd[1]: Reached target nss-lookup.target. Jul 11 00:46:53.802640 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Jul 11 00:46:53.804327 systemd-modules-load[291]: Inserted module 'dm_multipath' Jul 11 00:46:53.805137 systemd[1]: Finished systemd-modules-load.service. Jul 11 00:46:53.809289 kernel: audit: type=1130 audit(1752194813.805:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 11 00:46:53.805000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 11 00:46:53.806714 systemd[1]: Starting systemd-sysctl.service... Jul 11 00:46:53.815621 systemd[1]: Finished systemd-sysctl.service. Jul 11 00:46:53.816000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 11 00:46:53.820134 kernel: audit: type=1130 audit(1752194813.816:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 11 00:46:53.857146 kernel: Loading iSCSI transport class v2.0-870. Jul 11 00:46:53.871142 kernel: iscsi: registered transport (tcp) Jul 11 00:46:53.889402 kernel: iscsi: registered transport (qla4xxx) Jul 11 00:46:53.889455 kernel: QLogic iSCSI HBA Driver Jul 11 00:46:53.932438 systemd[1]: Finished dracut-cmdline.service. Jul 11 00:46:53.933000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 11 00:46:53.936197 kernel: audit: type=1130 audit(1752194813.933:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 11 00:46:53.934055 systemd[1]: Starting dracut-pre-udev.service... Jul 11 00:46:53.976141 kernel: raid6: neonx8 gen() 13647 MB/s Jul 11 00:46:53.993144 kernel: raid6: neonx8 xor() 10749 MB/s Jul 11 00:46:54.010145 kernel: raid6: neonx4 gen() 13453 MB/s Jul 11 00:46:54.027143 kernel: raid6: neonx4 xor() 11154 MB/s Jul 11 00:46:54.044147 kernel: raid6: neonx2 gen() 12919 MB/s Jul 11 00:46:54.061135 kernel: raid6: neonx2 xor() 10256 MB/s Jul 11 00:46:54.078144 kernel: raid6: neonx1 gen() 10573 MB/s Jul 11 00:46:54.095146 kernel: raid6: neonx1 xor() 8761 MB/s Jul 11 00:46:54.112136 kernel: raid6: int64x8 gen() 6244 MB/s Jul 11 00:46:54.129143 kernel: raid6: int64x8 xor() 3528 MB/s Jul 11 00:46:54.146142 kernel: raid6: int64x4 gen() 7218 MB/s Jul 11 00:46:54.163143 kernel: raid6: int64x4 xor() 3843 MB/s Jul 11 00:46:54.180144 kernel: raid6: int64x2 gen() 6120 MB/s Jul 11 00:46:54.197133 kernel: raid6: int64x2 xor() 3312 MB/s Jul 11 00:46:54.214144 kernel: raid6: int64x1 gen() 5030 MB/s Jul 11 00:46:54.231199 kernel: raid6: int64x1 xor() 2637 MB/s Jul 11 00:46:54.231213 kernel: raid6: using algorithm neonx8 gen() 13647 MB/s Jul 11 00:46:54.231222 kernel: raid6: .... xor() 10749 MB/s, rmw enabled Jul 11 00:46:54.232280 kernel: raid6: using neon recovery algorithm Jul 11 00:46:54.243525 kernel: xor: measuring software checksum speed Jul 11 00:46:54.243556 kernel: 8regs : 17195 MB/sec Jul 11 00:46:54.243573 kernel: 32regs : 20702 MB/sec Jul 11 00:46:54.244740 kernel: arm64_neon : 27616 MB/sec Jul 11 00:46:54.244752 kernel: xor: using function: arm64_neon (27616 MB/sec) Jul 11 00:46:54.299139 kernel: Btrfs loaded, crc32c=crc32c-generic, zoned=no, fsverity=no Jul 11 00:46:54.308497 systemd[1]: Finished dracut-pre-udev.service. Jul 11 00:46:54.309000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 11 00:46:54.312000 audit: BPF prog-id=7 op=LOAD Jul 11 00:46:54.312869 kernel: audit: type=1130 audit(1752194814.309:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 11 00:46:54.312901 kernel: audit: type=1334 audit(1752194814.312:10): prog-id=7 op=LOAD Jul 11 00:46:54.312000 audit: BPF prog-id=8 op=LOAD Jul 11 00:46:54.313247 systemd[1]: Starting systemd-udevd.service... Jul 11 00:46:54.325234 systemd-udevd[492]: Using default interface naming scheme 'v252'. Jul 11 00:46:54.328609 systemd[1]: Started systemd-udevd.service. Jul 11 00:46:54.329000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 11 00:46:54.330435 systemd[1]: Starting dracut-pre-trigger.service... Jul 11 00:46:54.341577 dracut-pre-trigger[499]: rd.md=0: removing MD RAID activation Jul 11 00:46:54.367205 systemd[1]: Finished dracut-pre-trigger.service. Jul 11 00:46:54.367000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 11 00:46:54.368723 systemd[1]: Starting systemd-udev-trigger.service... Jul 11 00:46:54.400567 systemd[1]: Finished systemd-udev-trigger.service. Jul 11 00:46:54.401000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 11 00:46:54.435471 kernel: virtio_blk virtio1: [vda] 19775488 512-byte logical blocks (10.1 GB/9.43 GiB) Jul 11 00:46:54.442526 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Jul 11 00:46:54.442539 kernel: GPT:9289727 != 19775487 Jul 11 00:46:54.442548 kernel: GPT:Alternate GPT header not at the end of the disk. Jul 11 00:46:54.442560 kernel: GPT:9289727 != 19775487 Jul 11 00:46:54.442568 kernel: GPT: Use GNU Parted to correct GPT errors. Jul 11 00:46:54.442577 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Jul 11 00:46:54.452873 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Jul 11 00:46:54.453953 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Jul 11 00:46:54.459155 kernel: BTRFS: device label OEM devid 1 transid 10 /dev/vda6 scanned by (udev-worker) (547) Jul 11 00:46:54.459306 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Jul 11 00:46:54.462688 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Jul 11 00:46:54.467078 systemd[1]: Starting disk-uuid.service... Jul 11 00:46:54.471321 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Jul 11 00:46:54.475441 disk-uuid[563]: Primary Header is updated. Jul 11 00:46:54.475441 disk-uuid[563]: Secondary Entries is updated. Jul 11 00:46:54.475441 disk-uuid[563]: Secondary Header is updated. Jul 11 00:46:54.479139 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Jul 11 00:46:54.487134 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Jul 11 00:46:54.489134 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Jul 11 00:46:55.490139 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Jul 11 00:46:55.490800 disk-uuid[564]: The operation has completed successfully. Jul 11 00:46:55.510307 systemd[1]: disk-uuid.service: Deactivated successfully. Jul 11 00:46:55.511000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 11 00:46:55.511000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 11 00:46:55.510397 systemd[1]: Finished disk-uuid.service. Jul 11 00:46:55.514359 systemd[1]: Starting verity-setup.service... Jul 11 00:46:55.529146 kernel: device-mapper: verity: sha256 using implementation "sha256-ce" Jul 11 00:46:55.549300 systemd[1]: Found device dev-mapper-usr.device. Jul 11 00:46:55.550760 systemd[1]: Mounting sysusr-usr.mount... Jul 11 00:46:55.551551 systemd[1]: Finished verity-setup.service. Jul 11 00:46:55.552000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 11 00:46:55.598690 systemd[1]: Mounted sysusr-usr.mount. Jul 11 00:46:55.599947 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Jul 11 00:46:55.599507 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Jul 11 00:46:55.600146 systemd[1]: Starting ignition-setup.service... Jul 11 00:46:55.602426 systemd[1]: Starting parse-ip-for-networkd.service... Jul 11 00:46:55.608607 kernel: BTRFS info (device vda6): using crc32c (crc32c-generic) checksum algorithm Jul 11 00:46:55.608642 kernel: BTRFS info (device vda6): using free space tree Jul 11 00:46:55.608652 kernel: BTRFS info (device vda6): has skinny extents Jul 11 00:46:55.619018 systemd[1]: mnt-oem.mount: Deactivated successfully. Jul 11 00:46:55.626543 systemd[1]: Finished ignition-setup.service. Jul 11 00:46:55.627000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 11 00:46:55.627945 systemd[1]: Starting ignition-fetch-offline.service... Jul 11 00:46:55.679232 systemd[1]: Finished parse-ip-for-networkd.service. Jul 11 00:46:55.679000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 11 00:46:55.680000 audit: BPF prog-id=9 op=LOAD Jul 11 00:46:55.681264 systemd[1]: Starting systemd-networkd.service... Jul 11 00:46:55.707166 ignition[660]: Ignition 2.14.0 Jul 11 00:46:55.707176 ignition[660]: Stage: fetch-offline Jul 11 00:46:55.707209 ignition[660]: no configs at "/usr/lib/ignition/base.d" Jul 11 00:46:55.708561 systemd-networkd[740]: lo: Link UP Jul 11 00:46:55.710000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 11 00:46:55.707218 ignition[660]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" Jul 11 00:46:55.708564 systemd-networkd[740]: lo: Gained carrier Jul 11 00:46:55.707337 ignition[660]: parsed url from cmdline: "" Jul 11 00:46:55.709573 systemd-networkd[740]: Enumeration completed Jul 11 00:46:55.707340 ignition[660]: no config URL provided Jul 11 00:46:55.709653 systemd[1]: Started systemd-networkd.service. Jul 11 00:46:55.707345 ignition[660]: reading system config file "/usr/lib/ignition/user.ign" Jul 11 00:46:55.710638 systemd[1]: Reached target network.target. Jul 11 00:46:55.707351 ignition[660]: no config at "/usr/lib/ignition/user.ign" Jul 11 00:46:55.712418 systemd[1]: Starting iscsiuio.service... Jul 11 00:46:55.707367 ignition[660]: op(1): [started] loading QEMU firmware config module Jul 11 00:46:55.713851 systemd-networkd[740]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Jul 11 00:46:55.707371 ignition[660]: op(1): executing: "modprobe" "qemu_fw_cfg" Jul 11 00:46:55.715481 systemd-networkd[740]: eth0: Link UP Jul 11 00:46:55.711177 ignition[660]: op(1): [finished] loading QEMU firmware config module Jul 11 00:46:55.724000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 11 00:46:55.715485 systemd-networkd[740]: eth0: Gained carrier Jul 11 00:46:55.723384 systemd[1]: Started iscsiuio.service. Jul 11 00:46:55.727168 ignition[660]: parsing config with SHA512: da91cace5cff4a16b2f89a83a01dfb22c002be4c91470e4918915e49b21487223b8ad059ec2c01ccc80dbf5c734bbbfcdee7df491c8d9dcb6dd9f1cd00a9b451 Jul 11 00:46:55.725043 systemd[1]: Starting iscsid.service... Jul 11 00:46:55.726200 systemd-networkd[740]: eth0: DHCPv4 address 10.0.0.4/16, gateway 10.0.0.1 acquired from 10.0.0.1 Jul 11 00:46:55.729279 iscsid[746]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Jul 11 00:46:55.729279 iscsid[746]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Jul 11 00:46:55.729279 iscsid[746]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Jul 11 00:46:55.729279 iscsid[746]: If using hardware iscsi like qla4xxx this message can be ignored. Jul 11 00:46:55.729279 iscsid[746]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Jul 11 00:46:55.729279 iscsid[746]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Jul 11 00:46:55.735000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 11 00:46:55.731059 systemd[1]: Started iscsid.service. Jul 11 00:46:55.736850 systemd[1]: Starting dracut-initqueue.service... Jul 11 00:46:55.745030 unknown[660]: fetched base config from "system" Jul 11 00:46:55.745040 unknown[660]: fetched user config from "qemu" Jul 11 00:46:55.745357 ignition[660]: fetch-offline: fetch-offline passed Jul 11 00:46:55.747000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 11 00:46:55.746529 systemd[1]: Finished ignition-fetch-offline.service. Jul 11 00:46:55.749000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 11 00:46:55.745407 ignition[660]: Ignition finished successfully Jul 11 00:46:55.748091 systemd[1]: Finished dracut-initqueue.service. Jul 11 00:46:55.749354 systemd[1]: Reached target remote-fs-pre.target. Jul 11 00:46:55.750554 systemd[1]: Reached target remote-cryptsetup.target. Jul 11 00:46:55.751913 systemd[1]: Reached target remote-fs.target. Jul 11 00:46:55.753789 systemd[1]: Starting dracut-pre-mount.service... Jul 11 00:46:55.754473 systemd[1]: ignition-fetch.service was skipped because of an unmet condition check (ConditionPathExists=!/run/ignition.json). Jul 11 00:46:55.755095 systemd[1]: Starting ignition-kargs.service... Jul 11 00:46:55.761871 systemd[1]: Finished dracut-pre-mount.service. Jul 11 00:46:55.762000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 11 00:46:55.763648 ignition[757]: Ignition 2.14.0 Jul 11 00:46:55.763656 ignition[757]: Stage: kargs Jul 11 00:46:55.763738 ignition[757]: no configs at "/usr/lib/ignition/base.d" Jul 11 00:46:55.765925 systemd[1]: Finished ignition-kargs.service. Jul 11 00:46:55.767000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 11 00:46:55.763747 ignition[757]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" Jul 11 00:46:55.764428 ignition[757]: kargs: kargs passed Jul 11 00:46:55.767946 systemd[1]: Starting ignition-disks.service... Jul 11 00:46:55.764467 ignition[757]: Ignition finished successfully Jul 11 00:46:55.773927 ignition[768]: Ignition 2.14.0 Jul 11 00:46:55.773937 ignition[768]: Stage: disks Jul 11 00:46:55.774016 ignition[768]: no configs at "/usr/lib/ignition/base.d" Jul 11 00:46:55.774025 ignition[768]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" Jul 11 00:46:55.776000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 11 00:46:55.775622 systemd[1]: Finished ignition-disks.service. Jul 11 00:46:55.774787 ignition[768]: disks: disks passed Jul 11 00:46:55.776787 systemd[1]: Reached target initrd-root-device.target. Jul 11 00:46:55.774824 ignition[768]: Ignition finished successfully Jul 11 00:46:55.778393 systemd[1]: Reached target local-fs-pre.target. Jul 11 00:46:55.779694 systemd[1]: Reached target local-fs.target. Jul 11 00:46:55.780841 systemd[1]: Reached target sysinit.target. Jul 11 00:46:55.782216 systemd[1]: Reached target basic.target. Jul 11 00:46:55.784207 systemd[1]: Starting systemd-fsck-root.service... Jul 11 00:46:55.794712 systemd-fsck[776]: ROOT: clean, 619/553520 files, 56022/553472 blocks Jul 11 00:46:55.799805 systemd[1]: Finished systemd-fsck-root.service. Jul 11 00:46:55.800000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 11 00:46:55.801428 systemd[1]: Mounting sysroot.mount... Jul 11 00:46:55.807127 kernel: EXT4-fs (vda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Jul 11 00:46:55.807634 systemd[1]: Mounted sysroot.mount. Jul 11 00:46:55.808363 systemd[1]: Reached target initrd-root-fs.target. Jul 11 00:46:55.810553 systemd[1]: Mounting sysroot-usr.mount... Jul 11 00:46:55.811405 systemd[1]: flatcar-metadata-hostname.service was skipped because no trigger condition checks were met. Jul 11 00:46:55.811441 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Jul 11 00:46:55.811462 systemd[1]: Reached target ignition-diskful.target. Jul 11 00:46:55.813144 systemd[1]: Mounted sysroot-usr.mount. Jul 11 00:46:55.814917 systemd[1]: Starting initrd-setup-root.service... Jul 11 00:46:55.818928 initrd-setup-root[786]: cut: /sysroot/etc/passwd: No such file or directory Jul 11 00:46:55.822301 initrd-setup-root[794]: cut: /sysroot/etc/group: No such file or directory Jul 11 00:46:55.826250 initrd-setup-root[802]: cut: /sysroot/etc/shadow: No such file or directory Jul 11 00:46:55.829975 initrd-setup-root[810]: cut: /sysroot/etc/gshadow: No such file or directory Jul 11 00:46:55.854810 systemd[1]: Finished initrd-setup-root.service. Jul 11 00:46:55.855000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 11 00:46:55.856293 systemd[1]: Starting ignition-mount.service... Jul 11 00:46:55.857512 systemd[1]: Starting sysroot-boot.service... Jul 11 00:46:55.861173 bash[827]: umount: /sysroot/usr/share/oem: not mounted. Jul 11 00:46:55.868835 ignition[828]: INFO : Ignition 2.14.0 Jul 11 00:46:55.868835 ignition[828]: INFO : Stage: mount Jul 11 00:46:55.871904 ignition[828]: INFO : no configs at "/usr/lib/ignition/base.d" Jul 11 00:46:55.871904 ignition[828]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" Jul 11 00:46:55.871904 ignition[828]: INFO : mount: mount passed Jul 11 00:46:55.871904 ignition[828]: INFO : Ignition finished successfully Jul 11 00:46:55.870000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 11 00:46:55.871083 systemd[1]: Finished ignition-mount.service. Jul 11 00:46:55.879033 systemd[1]: Finished sysroot-boot.service. Jul 11 00:46:55.879000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 11 00:46:56.558663 systemd[1]: Mounting sysroot-usr-share-oem.mount... Jul 11 00:46:56.565381 kernel: BTRFS: device label OEM devid 1 transid 11 /dev/vda6 scanned by mount (838) Jul 11 00:46:56.565415 kernel: BTRFS info (device vda6): using crc32c (crc32c-generic) checksum algorithm Jul 11 00:46:56.565425 kernel: BTRFS info (device vda6): using free space tree Jul 11 00:46:56.566612 kernel: BTRFS info (device vda6): has skinny extents Jul 11 00:46:56.569254 systemd[1]: Mounted sysroot-usr-share-oem.mount. Jul 11 00:46:56.570708 systemd[1]: Starting ignition-files.service... Jul 11 00:46:56.583480 ignition[858]: INFO : Ignition 2.14.0 Jul 11 00:46:56.583480 ignition[858]: INFO : Stage: files Jul 11 00:46:56.584968 ignition[858]: INFO : no configs at "/usr/lib/ignition/base.d" Jul 11 00:46:56.584968 ignition[858]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" Jul 11 00:46:56.584968 ignition[858]: DEBUG : files: compiled without relabeling support, skipping Jul 11 00:46:56.588928 ignition[858]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Jul 11 00:46:56.588928 ignition[858]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Jul 11 00:46:56.592510 ignition[858]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Jul 11 00:46:56.593810 ignition[858]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Jul 11 00:46:56.595015 ignition[858]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Jul 11 00:46:56.595015 ignition[858]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/home/core/install.sh" Jul 11 00:46:56.595015 ignition[858]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/home/core/install.sh" Jul 11 00:46:56.595015 ignition[858]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/etc/flatcar/update.conf" Jul 11 00:46:56.593991 unknown[858]: wrote ssh authorized keys file for user: core Jul 11 00:46:56.601991 ignition[858]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/etc/flatcar/update.conf" Jul 11 00:46:56.601991 ignition[858]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.33.0-arm64.raw" Jul 11 00:46:56.601991 ignition[858]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.33.0-arm64.raw" Jul 11 00:46:56.601991 ignition[858]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.33.0-arm64.raw" Jul 11 00:46:56.601991 ignition[858]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET https://extensions.flatcar.org/extensions/kubernetes-v1.33.0-arm64.raw: attempt #1 Jul 11 00:46:57.163582 ignition[858]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET result: OK Jul 11 00:46:57.548504 systemd-networkd[740]: eth0: Gained IPv6LL Jul 11 00:46:57.771851 ignition[858]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.33.0-arm64.raw" Jul 11 00:46:57.771851 ignition[858]: INFO : files: op(7): [started] processing unit "coreos-metadata.service" Jul 11 00:46:57.775307 ignition[858]: INFO : files: op(7): op(8): [started] writing unit "coreos-metadata.service" at "/sysroot/etc/systemd/system/coreos-metadata.service" Jul 11 00:46:57.775307 ignition[858]: INFO : files: op(7): op(8): [finished] writing unit "coreos-metadata.service" at "/sysroot/etc/systemd/system/coreos-metadata.service" Jul 11 00:46:57.775307 ignition[858]: INFO : files: op(7): [finished] processing unit "coreos-metadata.service" Jul 11 00:46:57.775307 ignition[858]: INFO : files: op(9): [started] setting preset to disabled for "coreos-metadata.service" Jul 11 00:46:57.775307 ignition[858]: INFO : files: op(9): op(a): [started] removing enablement symlink(s) for "coreos-metadata.service" Jul 11 00:46:57.813919 ignition[858]: INFO : files: op(9): op(a): [finished] removing enablement symlink(s) for "coreos-metadata.service" Jul 11 00:46:57.816285 ignition[858]: INFO : files: op(9): [finished] setting preset to disabled for "coreos-metadata.service" Jul 11 00:46:57.816285 ignition[858]: INFO : files: createResultFile: createFiles: op(b): [started] writing file "/sysroot/etc/.ignition-result.json" Jul 11 00:46:57.816285 ignition[858]: INFO : files: createResultFile: createFiles: op(b): [finished] writing file "/sysroot/etc/.ignition-result.json" Jul 11 00:46:57.816285 ignition[858]: INFO : files: files passed Jul 11 00:46:57.816285 ignition[858]: INFO : Ignition finished successfully Jul 11 00:46:57.818000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 11 00:46:57.816435 systemd[1]: Finished ignition-files.service. Jul 11 00:46:57.819256 systemd[1]: Starting initrd-setup-root-after-ignition.service... Jul 11 00:46:57.820603 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Jul 11 00:46:57.826000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 11 00:46:57.826000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 11 00:46:57.828603 initrd-setup-root-after-ignition[884]: grep: /sysroot/usr/share/oem/oem-release: No such file or directory Jul 11 00:46:57.829000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 11 00:46:57.821294 systemd[1]: Starting ignition-quench.service... Jul 11 00:46:57.832008 initrd-setup-root-after-ignition[886]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Jul 11 00:46:57.825593 systemd[1]: ignition-quench.service: Deactivated successfully. Jul 11 00:46:57.825676 systemd[1]: Finished ignition-quench.service. Jul 11 00:46:57.827177 systemd[1]: Finished initrd-setup-root-after-ignition.service. Jul 11 00:46:57.829441 systemd[1]: Reached target ignition-complete.target. Jul 11 00:46:57.832048 systemd[1]: Starting initrd-parse-etc.service... Jul 11 00:46:57.844841 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Jul 11 00:46:57.844933 systemd[1]: Finished initrd-parse-etc.service. Jul 11 00:46:57.846000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 11 00:46:57.846000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 11 00:46:57.846560 systemd[1]: Reached target initrd-fs.target. Jul 11 00:46:57.847746 systemd[1]: Reached target initrd.target. Jul 11 00:46:57.848996 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Jul 11 00:46:57.849825 systemd[1]: Starting dracut-pre-pivot.service... Jul 11 00:46:57.859761 systemd[1]: Finished dracut-pre-pivot.service. Jul 11 00:46:57.860000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 11 00:46:57.861371 systemd[1]: Starting initrd-cleanup.service... Jul 11 00:46:57.869485 systemd[1]: Stopped target nss-lookup.target. Jul 11 00:46:57.870320 systemd[1]: Stopped target remote-cryptsetup.target. Jul 11 00:46:57.871627 systemd[1]: Stopped target timers.target. Jul 11 00:46:57.872839 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Jul 11 00:46:57.873000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 11 00:46:57.872945 systemd[1]: Stopped dracut-pre-pivot.service. Jul 11 00:46:57.874157 systemd[1]: Stopped target initrd.target. Jul 11 00:46:57.875486 systemd[1]: Stopped target basic.target. Jul 11 00:46:57.876679 systemd[1]: Stopped target ignition-complete.target. Jul 11 00:46:57.877950 systemd[1]: Stopped target ignition-diskful.target. Jul 11 00:46:57.879237 systemd[1]: Stopped target initrd-root-device.target. Jul 11 00:46:57.880626 systemd[1]: Stopped target remote-fs.target. Jul 11 00:46:57.881903 systemd[1]: Stopped target remote-fs-pre.target. Jul 11 00:46:57.883260 systemd[1]: Stopped target sysinit.target. Jul 11 00:46:57.884446 systemd[1]: Stopped target local-fs.target. Jul 11 00:46:57.885695 systemd[1]: Stopped target local-fs-pre.target. Jul 11 00:46:57.886910 systemd[1]: Stopped target swap.target. Jul 11 00:46:57.889000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 11 00:46:57.888054 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Jul 11 00:46:57.888192 systemd[1]: Stopped dracut-pre-mount.service. Jul 11 00:46:57.891000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 11 00:46:57.889418 systemd[1]: Stopped target cryptsetup.target. Jul 11 00:46:57.893000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 11 00:46:57.890539 systemd[1]: dracut-initqueue.service: Deactivated successfully. Jul 11 00:46:57.890642 systemd[1]: Stopped dracut-initqueue.service. Jul 11 00:46:57.892044 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Jul 11 00:46:57.892167 systemd[1]: Stopped ignition-fetch-offline.service. Jul 11 00:46:57.893397 systemd[1]: Stopped target paths.target. Jul 11 00:46:57.894540 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Jul 11 00:46:57.898146 systemd[1]: Stopped systemd-ask-password-console.path. Jul 11 00:46:57.899214 systemd[1]: Stopped target slices.target. Jul 11 00:46:57.900623 systemd[1]: Stopped target sockets.target. Jul 11 00:46:57.901912 systemd[1]: iscsid.socket: Deactivated successfully. Jul 11 00:46:57.901980 systemd[1]: Closed iscsid.socket. Jul 11 00:46:57.905000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 11 00:46:57.903006 systemd[1]: iscsiuio.socket: Deactivated successfully. Jul 11 00:46:57.906000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 11 00:46:57.903070 systemd[1]: Closed iscsiuio.socket. Jul 11 00:46:57.904128 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Jul 11 00:46:57.904231 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Jul 11 00:46:57.905585 systemd[1]: ignition-files.service: Deactivated successfully. Jul 11 00:46:57.911000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 11 00:46:57.905675 systemd[1]: Stopped ignition-files.service. Jul 11 00:46:57.912000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 11 00:46:57.907627 systemd[1]: Stopping ignition-mount.service... Jul 11 00:46:57.909280 systemd[1]: Stopping sysroot-boot.service... Jul 11 00:46:57.910004 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Jul 11 00:46:57.910163 systemd[1]: Stopped systemd-udev-trigger.service. Jul 11 00:46:57.917000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 11 00:46:57.917000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 11 00:46:57.911614 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Jul 11 00:46:57.919537 ignition[899]: INFO : Ignition 2.14.0 Jul 11 00:46:57.919537 ignition[899]: INFO : Stage: umount Jul 11 00:46:57.919537 ignition[899]: INFO : no configs at "/usr/lib/ignition/base.d" Jul 11 00:46:57.919537 ignition[899]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" Jul 11 00:46:57.919537 ignition[899]: INFO : umount: umount passed Jul 11 00:46:57.919537 ignition[899]: INFO : Ignition finished successfully Jul 11 00:46:57.920000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 11 00:46:57.923000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 11 00:46:57.924000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 11 00:46:57.926000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 11 00:46:57.911699 systemd[1]: Stopped dracut-pre-trigger.service. Jul 11 00:46:57.916218 systemd[1]: initrd-cleanup.service: Deactivated successfully. Jul 11 00:46:57.916317 systemd[1]: Finished initrd-cleanup.service. Jul 11 00:46:57.918508 systemd[1]: sysroot-boot.mount: Deactivated successfully. Jul 11 00:46:57.919658 systemd[1]: ignition-mount.service: Deactivated successfully. Jul 11 00:46:57.919735 systemd[1]: Stopped ignition-mount.service. Jul 11 00:46:57.921016 systemd[1]: Stopped target network.target. Jul 11 00:46:57.933000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 11 00:46:57.922121 systemd[1]: ignition-disks.service: Deactivated successfully. Jul 11 00:46:57.922176 systemd[1]: Stopped ignition-disks.service. Jul 11 00:46:57.923583 systemd[1]: ignition-kargs.service: Deactivated successfully. Jul 11 00:46:57.937000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 11 00:46:57.923622 systemd[1]: Stopped ignition-kargs.service. Jul 11 00:46:57.938000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 11 00:46:57.925172 systemd[1]: ignition-setup.service: Deactivated successfully. Jul 11 00:46:57.940000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 11 00:46:57.925210 systemd[1]: Stopped ignition-setup.service. Jul 11 00:46:57.926527 systemd[1]: Stopping systemd-networkd.service... Jul 11 00:46:57.927902 systemd[1]: Stopping systemd-resolved.service... Jul 11 00:46:57.946000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 11 00:46:57.931448 systemd-networkd[740]: eth0: DHCPv6 lease lost Jul 11 00:46:57.932359 systemd[1]: systemd-networkd.service: Deactivated successfully. Jul 11 00:46:57.932446 systemd[1]: Stopped systemd-networkd.service. Jul 11 00:46:57.949000 audit: BPF prog-id=9 op=UNLOAD Jul 11 00:46:57.933686 systemd[1]: systemd-networkd.socket: Deactivated successfully. Jul 11 00:46:57.933713 systemd[1]: Closed systemd-networkd.socket. Jul 11 00:46:57.935413 systemd[1]: Stopping network-cleanup.service... Jul 11 00:46:57.952000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 11 00:46:57.953000 audit: BPF prog-id=6 op=UNLOAD Jul 11 00:46:57.936186 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Jul 11 00:46:57.936245 systemd[1]: Stopped parse-ip-for-networkd.service. Jul 11 00:46:57.937559 systemd[1]: systemd-sysctl.service: Deactivated successfully. Jul 11 00:46:57.954000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 11 00:46:57.937599 systemd[1]: Stopped systemd-sysctl.service. Jul 11 00:46:57.939524 systemd[1]: systemd-modules-load.service: Deactivated successfully. Jul 11 00:46:57.959000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 11 00:46:57.939563 systemd[1]: Stopped systemd-modules-load.service. Jul 11 00:46:57.960000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 11 00:46:57.940576 systemd[1]: Stopping systemd-udevd.service... Jul 11 00:46:57.962000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 11 00:46:57.945467 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Jul 11 00:46:57.945865 systemd[1]: systemd-resolved.service: Deactivated successfully. Jul 11 00:46:57.945952 systemd[1]: Stopped systemd-resolved.service. Jul 11 00:46:57.967000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 11 00:46:57.951214 systemd[1]: systemd-udevd.service: Deactivated successfully. Jul 11 00:46:57.968000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 11 00:46:57.951349 systemd[1]: Stopped systemd-udevd.service. Jul 11 00:46:57.970000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 11 00:46:57.953019 systemd[1]: network-cleanup.service: Deactivated successfully. Jul 11 00:46:57.953167 systemd[1]: Stopped network-cleanup.service. Jul 11 00:46:57.972000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 11 00:46:57.955290 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Jul 11 00:46:57.973000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 11 00:46:57.973000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 11 00:46:57.955323 systemd[1]: Closed systemd-udevd-control.socket. Jul 11 00:46:57.956503 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Jul 11 00:46:57.976000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 11 00:46:57.956547 systemd[1]: Closed systemd-udevd-kernel.socket. Jul 11 00:46:57.958000 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Jul 11 00:46:57.958045 systemd[1]: Stopped dracut-pre-udev.service. Jul 11 00:46:57.959421 systemd[1]: dracut-cmdline.service: Deactivated successfully. Jul 11 00:46:57.959464 systemd[1]: Stopped dracut-cmdline.service. Jul 11 00:46:57.960882 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Jul 11 00:46:57.960923 systemd[1]: Stopped dracut-cmdline-ask.service. Jul 11 00:46:57.963059 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Jul 11 00:46:57.965604 systemd[1]: systemd-tmpfiles-setup-dev.service: Deactivated successfully. Jul 11 00:46:57.965670 systemd[1]: Stopped systemd-tmpfiles-setup-dev.service. Jul 11 00:46:57.967812 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Jul 11 00:46:57.967857 systemd[1]: Stopped kmod-static-nodes.service. Jul 11 00:46:57.968750 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Jul 11 00:46:57.968791 systemd[1]: Stopped systemd-vconsole-setup.service. Jul 11 00:46:57.970905 systemd[1]: run-credentials-systemd\x2dtmpfiles\x2dsetup\x2ddev.service.mount: Deactivated successfully. Jul 11 00:46:57.971413 systemd[1]: sysroot-boot.service: Deactivated successfully. Jul 11 00:46:57.971501 systemd[1]: Stopped sysroot-boot.service. Jul 11 00:46:57.972568 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Jul 11 00:46:57.972659 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Jul 11 00:46:57.973985 systemd[1]: Reached target initrd-switch-root.target. Jul 11 00:46:57.975406 systemd[1]: initrd-setup-root.service: Deactivated successfully. Jul 11 00:46:57.975461 systemd[1]: Stopped initrd-setup-root.service. Jul 11 00:46:57.977462 systemd[1]: Starting initrd-switch-root.service... Jul 11 00:46:57.984228 systemd[1]: Switching root. Jul 11 00:46:58.003645 iscsid[746]: iscsid shutting down. Jul 11 00:46:58.004274 systemd-journald[290]: Received SIGTERM from PID 1 (systemd). Jul 11 00:46:58.004309 systemd-journald[290]: Journal stopped Jul 11 00:46:59.980032 kernel: SELinux: Class mctp_socket not defined in policy. Jul 11 00:46:59.980076 kernel: SELinux: Class anon_inode not defined in policy. Jul 11 00:46:59.980087 kernel: SELinux: the above unknown classes and permissions will be allowed Jul 11 00:46:59.980117 kernel: SELinux: policy capability network_peer_controls=1 Jul 11 00:46:59.980140 kernel: SELinux: policy capability open_perms=1 Jul 11 00:46:59.980151 kernel: SELinux: policy capability extended_socket_class=1 Jul 11 00:46:59.980162 kernel: SELinux: policy capability always_check_network=0 Jul 11 00:46:59.980171 kernel: SELinux: policy capability cgroup_seclabel=1 Jul 11 00:46:59.980183 kernel: SELinux: policy capability nnp_nosuid_transition=1 Jul 11 00:46:59.980193 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Jul 11 00:46:59.980202 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Jul 11 00:46:59.980211 kernel: kauditd_printk_skb: 62 callbacks suppressed Jul 11 00:46:59.980224 kernel: audit: type=1403 audit(1752194818.066:73): auid=4294967295 ses=4294967295 lsm=selinux res=1 Jul 11 00:46:59.980239 systemd[1]: Successfully loaded SELinux policy in 35.371ms. Jul 11 00:46:59.980261 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 6.948ms. Jul 11 00:46:59.980273 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Jul 11 00:46:59.980285 systemd[1]: Detected virtualization kvm. Jul 11 00:46:59.980296 systemd[1]: Detected architecture arm64. Jul 11 00:46:59.980305 systemd[1]: Detected first boot. Jul 11 00:46:59.980315 systemd[1]: Initializing machine ID from VM UUID. Jul 11 00:46:59.980326 kernel: audit: type=1400 audit(1752194818.138:74): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Jul 11 00:46:59.980336 kernel: audit: type=1400 audit(1752194818.138:75): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Jul 11 00:46:59.980346 kernel: audit: type=1334 audit(1752194818.141:76): prog-id=10 op=LOAD Jul 11 00:46:59.980356 kernel: audit: type=1334 audit(1752194818.141:77): prog-id=10 op=UNLOAD Jul 11 00:46:59.980366 kernel: audit: type=1334 audit(1752194818.143:78): prog-id=11 op=LOAD Jul 11 00:46:59.980376 kernel: audit: type=1334 audit(1752194818.143:79): prog-id=11 op=UNLOAD Jul 11 00:46:59.980385 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). Jul 11 00:46:59.980399 kernel: audit: type=1400 audit(1752194818.184:80): avc: denied { associate } for pid=932 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Jul 11 00:46:59.980410 kernel: audit: type=1300 audit(1752194818.184:80): arch=c00000b7 syscall=5 success=yes exit=0 a0=400024d89c a1=4000150de0 a2=40001570c0 a3=32 items=0 ppid=915 pid=932 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 11 00:46:59.980422 kernel: audit: type=1327 audit(1752194818.184:80): proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Jul 11 00:46:59.980434 systemd[1]: Populated /etc with preset unit settings. Jul 11 00:46:59.980445 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Jul 11 00:46:59.980459 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Jul 11 00:46:59.980471 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Jul 11 00:46:59.980482 systemd[1]: iscsiuio.service: Deactivated successfully. Jul 11 00:46:59.980492 systemd[1]: Stopped iscsiuio.service. Jul 11 00:46:59.980502 systemd[1]: iscsid.service: Deactivated successfully. Jul 11 00:46:59.980513 systemd[1]: Stopped iscsid.service. Jul 11 00:46:59.980525 systemd[1]: initrd-switch-root.service: Deactivated successfully. Jul 11 00:46:59.980535 systemd[1]: Stopped initrd-switch-root.service. Jul 11 00:46:59.980548 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Jul 11 00:46:59.980559 systemd[1]: Created slice system-addon\x2dconfig.slice. Jul 11 00:46:59.980570 systemd[1]: Created slice system-addon\x2drun.slice. Jul 11 00:46:59.980580 systemd[1]: Created slice system-getty.slice. Jul 11 00:46:59.980590 systemd[1]: Created slice system-modprobe.slice. Jul 11 00:46:59.980600 systemd[1]: Created slice system-serial\x2dgetty.slice. Jul 11 00:46:59.980611 systemd[1]: Created slice system-system\x2dcloudinit.slice. Jul 11 00:46:59.980622 systemd[1]: Created slice system-systemd\x2dfsck.slice. Jul 11 00:46:59.980632 systemd[1]: Created slice user.slice. Jul 11 00:46:59.980642 systemd[1]: Started systemd-ask-password-console.path. Jul 11 00:46:59.980652 systemd[1]: Started systemd-ask-password-wall.path. Jul 11 00:46:59.980662 systemd[1]: Set up automount boot.automount. Jul 11 00:46:59.980672 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Jul 11 00:46:59.980682 systemd[1]: Stopped target initrd-switch-root.target. Jul 11 00:46:59.980694 systemd[1]: Stopped target initrd-fs.target. Jul 11 00:46:59.980705 systemd[1]: Stopped target initrd-root-fs.target. Jul 11 00:46:59.980715 systemd[1]: Reached target integritysetup.target. Jul 11 00:46:59.980725 systemd[1]: Reached target remote-cryptsetup.target. Jul 11 00:46:59.980736 systemd[1]: Reached target remote-fs.target. Jul 11 00:46:59.980746 systemd[1]: Reached target slices.target. Jul 11 00:46:59.980756 systemd[1]: Reached target swap.target. Jul 11 00:46:59.980768 systemd[1]: Reached target torcx.target. Jul 11 00:46:59.980779 systemd[1]: Reached target veritysetup.target. Jul 11 00:46:59.980790 systemd[1]: Listening on systemd-coredump.socket. Jul 11 00:46:59.980800 systemd[1]: Listening on systemd-initctl.socket. Jul 11 00:46:59.980810 systemd[1]: Listening on systemd-networkd.socket. Jul 11 00:46:59.980820 systemd[1]: Listening on systemd-udevd-control.socket. Jul 11 00:46:59.980831 systemd[1]: Listening on systemd-udevd-kernel.socket. Jul 11 00:46:59.980841 systemd[1]: Listening on systemd-userdbd.socket. Jul 11 00:46:59.980851 systemd[1]: Mounting dev-hugepages.mount... Jul 11 00:46:59.980862 systemd[1]: Mounting dev-mqueue.mount... Jul 11 00:46:59.980872 systemd[1]: Mounting media.mount... Jul 11 00:46:59.980883 systemd[1]: Mounting sys-kernel-debug.mount... Jul 11 00:46:59.980894 systemd[1]: Mounting sys-kernel-tracing.mount... Jul 11 00:46:59.980904 systemd[1]: Mounting tmp.mount... Jul 11 00:46:59.980914 systemd[1]: Starting flatcar-tmpfiles.service... Jul 11 00:46:59.980924 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Jul 11 00:46:59.980935 systemd[1]: Starting kmod-static-nodes.service... Jul 11 00:46:59.980945 systemd[1]: Starting modprobe@configfs.service... Jul 11 00:46:59.980955 systemd[1]: Starting modprobe@dm_mod.service... Jul 11 00:46:59.980965 systemd[1]: Starting modprobe@drm.service... Jul 11 00:46:59.980976 systemd[1]: Starting modprobe@efi_pstore.service... Jul 11 00:46:59.980988 systemd[1]: Starting modprobe@fuse.service... Jul 11 00:46:59.980998 systemd[1]: Starting modprobe@loop.service... Jul 11 00:46:59.981008 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Jul 11 00:46:59.981019 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Jul 11 00:46:59.981029 systemd[1]: Stopped systemd-fsck-root.service. Jul 11 00:46:59.981039 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Jul 11 00:46:59.981050 systemd[1]: Stopped systemd-fsck-usr.service. Jul 11 00:46:59.981060 kernel: fuse: init (API version 7.34) Jul 11 00:46:59.981070 kernel: loop: module loaded Jul 11 00:46:59.981079 systemd[1]: Stopped systemd-journald.service. Jul 11 00:46:59.981094 systemd[1]: Starting systemd-journald.service... Jul 11 00:46:59.981126 systemd[1]: Starting systemd-modules-load.service... Jul 11 00:46:59.981138 systemd[1]: Starting systemd-network-generator.service... Jul 11 00:46:59.981148 systemd[1]: Starting systemd-remount-fs.service... Jul 11 00:46:59.981158 systemd[1]: Starting systemd-udev-trigger.service... Jul 11 00:46:59.981168 systemd[1]: verity-setup.service: Deactivated successfully. Jul 11 00:46:59.981178 systemd[1]: Stopped verity-setup.service. Jul 11 00:46:59.981190 systemd[1]: Mounted dev-hugepages.mount. Jul 11 00:46:59.981200 systemd[1]: Mounted dev-mqueue.mount. Jul 11 00:46:59.981209 systemd[1]: Mounted media.mount. Jul 11 00:46:59.981219 systemd[1]: Mounted sys-kernel-debug.mount. Jul 11 00:46:59.981229 systemd[1]: Mounted sys-kernel-tracing.mount. Jul 11 00:46:59.981240 systemd[1]: Mounted tmp.mount. Jul 11 00:46:59.981250 systemd[1]: Finished kmod-static-nodes.service. Jul 11 00:46:59.981261 systemd[1]: modprobe@configfs.service: Deactivated successfully. Jul 11 00:46:59.981272 systemd[1]: Finished modprobe@configfs.service. Jul 11 00:46:59.981282 systemd[1]: Finished flatcar-tmpfiles.service. Jul 11 00:46:59.981295 systemd-journald[1006]: Journal started Jul 11 00:46:59.981336 systemd-journald[1006]: Runtime Journal (/run/log/journal/096908c649034ca5b536d8c54e94741e) is 6.0M, max 48.7M, 42.6M free. Jul 11 00:46:58.066000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Jul 11 00:46:58.138000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Jul 11 00:46:58.138000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Jul 11 00:46:58.141000 audit: BPF prog-id=10 op=LOAD Jul 11 00:46:58.141000 audit: BPF prog-id=10 op=UNLOAD Jul 11 00:46:58.143000 audit: BPF prog-id=11 op=LOAD Jul 11 00:46:58.143000 audit: BPF prog-id=11 op=UNLOAD Jul 11 00:46:58.184000 audit[932]: AVC avc: denied { associate } for pid=932 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Jul 11 00:46:58.184000 audit[932]: SYSCALL arch=c00000b7 syscall=5 success=yes exit=0 a0=400024d89c a1=4000150de0 a2=40001570c0 a3=32 items=0 ppid=915 pid=932 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 11 00:46:58.184000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Jul 11 00:46:58.187000 audit[932]: AVC avc: denied { associate } for pid=932 comm="torcx-generator" name="lib" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Jul 11 00:46:58.187000 audit[932]: SYSCALL arch=c00000b7 syscall=34 success=yes exit=0 a0=ffffffffffffff9c a1=400024d975 a2=1ed a3=0 items=2 ppid=915 pid=932 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 11 00:46:58.187000 audit: CWD cwd="/" Jul 11 00:46:58.187000 audit: PATH item=0 name=(null) inode=2 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 11 00:46:58.187000 audit: PATH item=1 name=(null) inode=3 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 11 00:46:58.187000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Jul 11 00:46:59.850000 audit: BPF prog-id=12 op=LOAD Jul 11 00:46:59.850000 audit: BPF prog-id=3 op=UNLOAD Jul 11 00:46:59.850000 audit: BPF prog-id=13 op=LOAD Jul 11 00:46:59.850000 audit: BPF prog-id=14 op=LOAD Jul 11 00:46:59.850000 audit: BPF prog-id=4 op=UNLOAD Jul 11 00:46:59.850000 audit: BPF prog-id=5 op=UNLOAD Jul 11 00:46:59.851000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 11 00:46:59.854000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 11 00:46:59.856000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 11 00:46:59.859000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 11 00:46:59.859000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 11 00:46:59.862000 audit: BPF prog-id=12 op=UNLOAD Jul 11 00:46:59.944000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 11 00:46:59.947000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 11 00:46:59.949000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 11 00:46:59.949000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 11 00:46:59.949000 audit: BPF prog-id=15 op=LOAD Jul 11 00:46:59.949000 audit: BPF prog-id=16 op=LOAD Jul 11 00:46:59.949000 audit: BPF prog-id=17 op=LOAD Jul 11 00:46:59.949000 audit: BPF prog-id=13 op=UNLOAD Jul 11 00:46:59.949000 audit: BPF prog-id=14 op=UNLOAD Jul 11 00:46:59.965000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 11 00:46:59.976000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 11 00:46:59.977000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Jul 11 00:46:59.977000 audit[1006]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=60 a0=6 a1=ffffc3853bf0 a2=4000 a3=1 items=0 ppid=1 pid=1006 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 11 00:46:59.977000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Jul 11 00:46:59.979000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 11 00:46:59.979000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 11 00:46:59.981000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 11 00:46:59.848601 systemd[1]: Queued start job for default target multi-user.target. Jul 11 00:46:58.183411 /usr/lib/systemd/system-generators/torcx-generator[932]: time="2025-07-11T00:46:58Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" Jul 11 00:46:59.848613 systemd[1]: Unnecessary job was removed for dev-vda6.device. Jul 11 00:46:58.183672 /usr/lib/systemd/system-generators/torcx-generator[932]: time="2025-07-11T00:46:58Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Jul 11 00:46:59.851674 systemd[1]: systemd-journald.service: Deactivated successfully. Jul 11 00:46:58.183705 /usr/lib/systemd/system-generators/torcx-generator[932]: time="2025-07-11T00:46:58Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Jul 11 00:46:58.183735 /usr/lib/systemd/system-generators/torcx-generator[932]: time="2025-07-11T00:46:58Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Jul 11 00:46:58.183744 /usr/lib/systemd/system-generators/torcx-generator[932]: time="2025-07-11T00:46:58Z" level=debug msg="skipped missing lower profile" missing profile=oem Jul 11 00:46:58.183771 /usr/lib/systemd/system-generators/torcx-generator[932]: time="2025-07-11T00:46:58Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Jul 11 00:46:58.183782 /usr/lib/systemd/system-generators/torcx-generator[932]: time="2025-07-11T00:46:58Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Jul 11 00:46:59.983132 systemd[1]: Started systemd-journald.service. Jul 11 00:46:58.183978 /usr/lib/systemd/system-generators/torcx-generator[932]: time="2025-07-11T00:46:58Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Jul 11 00:46:59.983000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 11 00:46:58.184011 /usr/lib/systemd/system-generators/torcx-generator[932]: time="2025-07-11T00:46:58Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Jul 11 00:46:58.184023 /usr/lib/systemd/system-generators/torcx-generator[932]: time="2025-07-11T00:46:58Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Jul 11 00:46:58.184672 /usr/lib/systemd/system-generators/torcx-generator[932]: time="2025-07-11T00:46:58Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Jul 11 00:46:58.184705 /usr/lib/systemd/system-generators/torcx-generator[932]: time="2025-07-11T00:46:58Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Jul 11 00:46:58.184722 /usr/lib/systemd/system-generators/torcx-generator[932]: time="2025-07-11T00:46:58Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.7: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.7 Jul 11 00:46:58.184736 /usr/lib/systemd/system-generators/torcx-generator[932]: time="2025-07-11T00:46:58Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Jul 11 00:46:58.184753 /usr/lib/systemd/system-generators/torcx-generator[932]: time="2025-07-11T00:46:58Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.7: no such file or directory" path=/var/lib/torcx/store/3510.3.7 Jul 11 00:46:59.983645 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Jul 11 00:46:58.184765 /usr/lib/systemd/system-generators/torcx-generator[932]: time="2025-07-11T00:46:58Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Jul 11 00:46:59.983797 systemd[1]: Finished modprobe@dm_mod.service. Jul 11 00:46:59.613042 /usr/lib/systemd/system-generators/torcx-generator[932]: time="2025-07-11T00:46:59Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Jul 11 00:46:59.613320 /usr/lib/systemd/system-generators/torcx-generator[932]: time="2025-07-11T00:46:59Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Jul 11 00:46:59.613422 /usr/lib/systemd/system-generators/torcx-generator[932]: time="2025-07-11T00:46:59Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Jul 11 00:46:59.613579 /usr/lib/systemd/system-generators/torcx-generator[932]: time="2025-07-11T00:46:59Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Jul 11 00:46:59.613628 /usr/lib/systemd/system-generators/torcx-generator[932]: time="2025-07-11T00:46:59Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Jul 11 00:46:59.613681 /usr/lib/systemd/system-generators/torcx-generator[932]: time="2025-07-11T00:46:59Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Jul 11 00:46:59.984000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 11 00:46:59.984000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 11 00:46:59.985050 systemd[1]: modprobe@drm.service: Deactivated successfully. Jul 11 00:46:59.985210 systemd[1]: Finished modprobe@drm.service. Jul 11 00:46:59.985000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 11 00:46:59.985000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 11 00:46:59.986238 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Jul 11 00:46:59.986399 systemd[1]: Finished modprobe@efi_pstore.service. Jul 11 00:46:59.987000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 11 00:46:59.987000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 11 00:46:59.987422 systemd[1]: modprobe@fuse.service: Deactivated successfully. Jul 11 00:46:59.987570 systemd[1]: Finished modprobe@fuse.service. Jul 11 00:46:59.988000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 11 00:46:59.988000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 11 00:46:59.988585 systemd[1]: modprobe@loop.service: Deactivated successfully. Jul 11 00:46:59.988731 systemd[1]: Finished modprobe@loop.service. Jul 11 00:46:59.989000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 11 00:46:59.989000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 11 00:46:59.989756 systemd[1]: Finished systemd-modules-load.service. Jul 11 00:46:59.990000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 11 00:46:59.990847 systemd[1]: Finished systemd-network-generator.service. Jul 11 00:46:59.991000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 11 00:46:59.992119 systemd[1]: Finished systemd-remount-fs.service. Jul 11 00:46:59.992000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 11 00:46:59.993367 systemd[1]: Reached target network-pre.target. Jul 11 00:46:59.995262 systemd[1]: Mounting sys-fs-fuse-connections.mount... Jul 11 00:46:59.997243 systemd[1]: Mounting sys-kernel-config.mount... Jul 11 00:46:59.997947 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Jul 11 00:47:00.000805 systemd[1]: Starting systemd-hwdb-update.service... Jul 11 00:47:00.002726 systemd[1]: Starting systemd-journal-flush.service... Jul 11 00:47:00.003599 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Jul 11 00:47:00.007439 systemd-journald[1006]: Time spent on flushing to /var/log/journal/096908c649034ca5b536d8c54e94741e is 12.731ms for 969 entries. Jul 11 00:47:00.007439 systemd-journald[1006]: System Journal (/var/log/journal/096908c649034ca5b536d8c54e94741e) is 8.0M, max 195.6M, 187.6M free. Jul 11 00:47:00.043197 systemd-journald[1006]: Received client request to flush runtime journal. Jul 11 00:47:00.012000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 11 00:47:00.021000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 11 00:47:00.028000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 11 00:47:00.038000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 11 00:47:00.004515 systemd[1]: Starting systemd-random-seed.service... Jul 11 00:47:00.005407 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Jul 11 00:47:00.006364 systemd[1]: Starting systemd-sysctl.service... Jul 11 00:47:00.008162 systemd[1]: Starting systemd-sysusers.service... Jul 11 00:47:00.044522 udevadm[1032]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation.service, lvm2-activation-early.service not to pull it in. Jul 11 00:47:00.011706 systemd[1]: Finished systemd-udev-trigger.service. Jul 11 00:47:00.012916 systemd[1]: Mounted sys-fs-fuse-connections.mount. Jul 11 00:47:00.013880 systemd[1]: Mounted sys-kernel-config.mount. Jul 11 00:47:00.018283 systemd[1]: Starting systemd-udev-settle.service... Jul 11 00:47:00.020972 systemd[1]: Finished systemd-random-seed.service. Jul 11 00:47:00.044000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 11 00:47:00.021930 systemd[1]: Reached target first-boot-complete.target. Jul 11 00:47:00.028080 systemd[1]: Finished systemd-sysctl.service. Jul 11 00:47:00.038070 systemd[1]: Finished systemd-sysusers.service. Jul 11 00:47:00.040157 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Jul 11 00:47:00.044086 systemd[1]: Finished systemd-journal-flush.service. Jul 11 00:47:00.058054 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Jul 11 00:47:00.058000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 11 00:47:00.444217 systemd[1]: Finished systemd-hwdb-update.service. Jul 11 00:47:00.444000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 11 00:47:00.445000 audit: BPF prog-id=18 op=LOAD Jul 11 00:47:00.445000 audit: BPF prog-id=19 op=LOAD Jul 11 00:47:00.445000 audit: BPF prog-id=7 op=UNLOAD Jul 11 00:47:00.445000 audit: BPF prog-id=8 op=UNLOAD Jul 11 00:47:00.446410 systemd[1]: Starting systemd-udevd.service... Jul 11 00:47:00.462804 systemd-udevd[1037]: Using default interface naming scheme 'v252'. Jul 11 00:47:00.477346 systemd[1]: Started systemd-udevd.service. Jul 11 00:47:00.478000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 11 00:47:00.484000 audit: BPF prog-id=20 op=LOAD Jul 11 00:47:00.486039 systemd[1]: Starting systemd-networkd.service... Jul 11 00:47:00.492000 audit: BPF prog-id=21 op=LOAD Jul 11 00:47:00.492000 audit: BPF prog-id=22 op=LOAD Jul 11 00:47:00.492000 audit: BPF prog-id=23 op=LOAD Jul 11 00:47:00.492888 systemd[1]: Starting systemd-userdbd.service... Jul 11 00:47:00.526743 systemd[1]: Started systemd-userdbd.service. Jul 11 00:47:00.528789 systemd[1]: Condition check resulted in dev-ttyAMA0.device being skipped. Jul 11 00:47:00.527000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 11 00:47:00.564972 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Jul 11 00:47:00.581483 systemd-networkd[1057]: lo: Link UP Jul 11 00:47:00.581495 systemd-networkd[1057]: lo: Gained carrier Jul 11 00:47:00.581843 systemd-networkd[1057]: Enumeration completed Jul 11 00:47:00.581955 systemd[1]: Started systemd-networkd.service. Jul 11 00:47:00.581961 systemd-networkd[1057]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Jul 11 00:47:00.582000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 11 00:47:00.583155 systemd-networkd[1057]: eth0: Link UP Jul 11 00:47:00.583167 systemd-networkd[1057]: eth0: Gained carrier Jul 11 00:47:00.585600 systemd[1]: Finished systemd-udev-settle.service. Jul 11 00:47:00.586000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 11 00:47:00.587535 systemd[1]: Starting lvm2-activation-early.service... Jul 11 00:47:00.600927 lvm[1070]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Jul 11 00:47:00.601121 systemd-networkd[1057]: eth0: DHCPv4 address 10.0.0.4/16, gateway 10.0.0.1 acquired from 10.0.0.1 Jul 11 00:47:00.629878 systemd[1]: Finished lvm2-activation-early.service. Jul 11 00:47:00.630000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 11 00:47:00.630846 systemd[1]: Reached target cryptsetup.target. Jul 11 00:47:00.632703 systemd[1]: Starting lvm2-activation.service... Jul 11 00:47:00.636266 lvm[1071]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Jul 11 00:47:00.662939 systemd[1]: Finished lvm2-activation.service. Jul 11 00:47:00.663000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 11 00:47:00.663835 systemd[1]: Reached target local-fs-pre.target. Jul 11 00:47:00.664647 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Jul 11 00:47:00.664678 systemd[1]: Reached target local-fs.target. Jul 11 00:47:00.665402 systemd[1]: Reached target machines.target. Jul 11 00:47:00.667215 systemd[1]: Starting ldconfig.service... Jul 11 00:47:00.668143 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Jul 11 00:47:00.668192 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Jul 11 00:47:00.669206 systemd[1]: Starting systemd-boot-update.service... Jul 11 00:47:00.671032 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Jul 11 00:47:00.673025 systemd[1]: Starting systemd-machine-id-commit.service... Jul 11 00:47:00.675429 systemd[1]: Starting systemd-sysext.service... Jul 11 00:47:00.676429 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1073 (bootctl) Jul 11 00:47:00.677991 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Jul 11 00:47:00.681925 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Jul 11 00:47:00.683000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 11 00:47:00.691933 systemd[1]: Unmounting usr-share-oem.mount... Jul 11 00:47:00.696845 systemd[1]: usr-share-oem.mount: Deactivated successfully. Jul 11 00:47:00.697038 systemd[1]: Unmounted usr-share-oem.mount. Jul 11 00:47:00.713154 kernel: loop0: detected capacity change from 0 to 211168 Jul 11 00:47:00.753974 systemd[1]: Finished systemd-machine-id-commit.service. Jul 11 00:47:00.754000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 11 00:47:00.762148 kernel: squashfs: version 4.0 (2009/01/31) Phillip Lougher Jul 11 00:47:00.763398 systemd-fsck[1081]: fsck.fat 4.2 (2021-01-31) Jul 11 00:47:00.763398 systemd-fsck[1081]: /dev/vda1: 236 files, 117310/258078 clusters Jul 11 00:47:00.766909 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Jul 11 00:47:00.768000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 11 00:47:00.787141 kernel: loop1: detected capacity change from 0 to 211168 Jul 11 00:47:00.792011 (sd-sysext)[1086]: Using extensions 'kubernetes'. Jul 11 00:47:00.792386 (sd-sysext)[1086]: Merged extensions into '/usr'. Jul 11 00:47:00.811349 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Jul 11 00:47:00.812810 systemd[1]: Starting modprobe@dm_mod.service... Jul 11 00:47:00.815223 systemd[1]: Starting modprobe@efi_pstore.service... Jul 11 00:47:00.817330 systemd[1]: Starting modprobe@loop.service... Jul 11 00:47:00.818418 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Jul 11 00:47:00.818555 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Jul 11 00:47:00.819495 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Jul 11 00:47:00.819683 systemd[1]: Finished modprobe@dm_mod.service. Jul 11 00:47:00.820000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 11 00:47:00.820000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 11 00:47:00.821067 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Jul 11 00:47:00.821211 systemd[1]: Finished modprobe@efi_pstore.service. Jul 11 00:47:00.822000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 11 00:47:00.822000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 11 00:47:00.822553 systemd[1]: modprobe@loop.service: Deactivated successfully. Jul 11 00:47:00.822653 systemd[1]: Finished modprobe@loop.service. Jul 11 00:47:00.823000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 11 00:47:00.823000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 11 00:47:00.823976 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Jul 11 00:47:00.824072 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Jul 11 00:47:00.860800 ldconfig[1072]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Jul 11 00:47:00.864654 systemd[1]: Finished ldconfig.service. Jul 11 00:47:00.865000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ldconfig comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 11 00:47:00.966573 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Jul 11 00:47:00.968384 systemd[1]: Mounting boot.mount... Jul 11 00:47:00.970225 systemd[1]: Mounting usr-share-oem.mount... Jul 11 00:47:00.976019 systemd[1]: Mounted boot.mount. Jul 11 00:47:00.978291 systemd[1]: Mounted usr-share-oem.mount. Jul 11 00:47:00.980000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 11 00:47:00.980060 systemd[1]: Finished systemd-sysext.service. Jul 11 00:47:00.982222 systemd[1]: Starting ensure-sysext.service... Jul 11 00:47:00.984287 systemd[1]: Starting systemd-tmpfiles-setup.service... Jul 11 00:47:00.985463 systemd[1]: Finished systemd-boot-update.service. Jul 11 00:47:00.986000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 11 00:47:00.989643 systemd[1]: Reloading. Jul 11 00:47:00.994321 systemd-tmpfiles[1094]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Jul 11 00:47:00.995359 systemd-tmpfiles[1094]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Jul 11 00:47:00.996780 systemd-tmpfiles[1094]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Jul 11 00:47:01.033732 /usr/lib/systemd/system-generators/torcx-generator[1114]: time="2025-07-11T00:47:01Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" Jul 11 00:47:01.033762 /usr/lib/systemd/system-generators/torcx-generator[1114]: time="2025-07-11T00:47:01Z" level=info msg="torcx already run" Jul 11 00:47:01.090975 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Jul 11 00:47:01.090998 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Jul 11 00:47:01.106408 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Jul 11 00:47:01.147000 audit: BPF prog-id=24 op=LOAD Jul 11 00:47:01.147000 audit: BPF prog-id=15 op=UNLOAD Jul 11 00:47:01.148000 audit: BPF prog-id=25 op=LOAD Jul 11 00:47:01.148000 audit: BPF prog-id=26 op=LOAD Jul 11 00:47:01.148000 audit: BPF prog-id=16 op=UNLOAD Jul 11 00:47:01.148000 audit: BPF prog-id=17 op=UNLOAD Jul 11 00:47:01.149000 audit: BPF prog-id=27 op=LOAD Jul 11 00:47:01.149000 audit: BPF prog-id=20 op=UNLOAD Jul 11 00:47:01.150000 audit: BPF prog-id=28 op=LOAD Jul 11 00:47:01.150000 audit: BPF prog-id=21 op=UNLOAD Jul 11 00:47:01.150000 audit: BPF prog-id=29 op=LOAD Jul 11 00:47:01.150000 audit: BPF prog-id=30 op=LOAD Jul 11 00:47:01.150000 audit: BPF prog-id=22 op=UNLOAD Jul 11 00:47:01.150000 audit: BPF prog-id=23 op=UNLOAD Jul 11 00:47:01.150000 audit: BPF prog-id=31 op=LOAD Jul 11 00:47:01.150000 audit: BPF prog-id=32 op=LOAD Jul 11 00:47:01.150000 audit: BPF prog-id=18 op=UNLOAD Jul 11 00:47:01.150000 audit: BPF prog-id=19 op=UNLOAD Jul 11 00:47:01.152958 systemd[1]: Finished systemd-tmpfiles-setup.service. Jul 11 00:47:01.153000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 11 00:47:01.157172 systemd[1]: Starting audit-rules.service... Jul 11 00:47:01.158850 systemd[1]: Starting clean-ca-certificates.service... Jul 11 00:47:01.160771 systemd[1]: Starting systemd-journal-catalog-update.service... Jul 11 00:47:01.164000 audit: BPF prog-id=33 op=LOAD Jul 11 00:47:01.165032 systemd[1]: Starting systemd-resolved.service... Jul 11 00:47:01.166000 audit: BPF prog-id=34 op=LOAD Jul 11 00:47:01.168597 systemd[1]: Starting systemd-timesyncd.service... Jul 11 00:47:01.170486 systemd[1]: Starting systemd-update-utmp.service... Jul 11 00:47:01.172000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 11 00:47:01.174000 audit[1158]: SYSTEM_BOOT pid=1158 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Jul 11 00:47:01.171765 systemd[1]: Finished clean-ca-certificates.service. Jul 11 00:47:01.174589 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Jul 11 00:47:01.177538 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Jul 11 00:47:01.178941 systemd[1]: Starting modprobe@dm_mod.service... Jul 11 00:47:01.181991 systemd[1]: Starting modprobe@efi_pstore.service... Jul 11 00:47:01.183886 systemd[1]: Starting modprobe@loop.service... Jul 11 00:47:01.184722 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Jul 11 00:47:01.184891 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Jul 11 00:47:01.185038 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Jul 11 00:47:01.186383 systemd[1]: Finished systemd-journal-catalog-update.service. Jul 11 00:47:01.187000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 11 00:47:01.188000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 11 00:47:01.188000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 11 00:47:01.187815 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Jul 11 00:47:01.187927 systemd[1]: Finished modprobe@dm_mod.service. Jul 11 00:47:01.189254 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Jul 11 00:47:01.189357 systemd[1]: Finished modprobe@efi_pstore.service. Jul 11 00:47:01.190000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 11 00:47:01.190000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 11 00:47:01.190623 systemd[1]: modprobe@loop.service: Deactivated successfully. Jul 11 00:47:01.190726 systemd[1]: Finished modprobe@loop.service. Jul 11 00:47:01.191000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 11 00:47:01.191000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 11 00:47:01.193494 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Jul 11 00:47:01.194663 systemd[1]: Starting modprobe@dm_mod.service... Jul 11 00:47:01.196603 systemd[1]: Starting modprobe@efi_pstore.service... Jul 11 00:47:01.198400 systemd[1]: Starting modprobe@loop.service... Jul 11 00:47:01.199181 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Jul 11 00:47:01.199297 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Jul 11 00:47:01.200527 systemd[1]: Starting systemd-update-done.service... Jul 11 00:47:01.201398 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Jul 11 00:47:01.202351 systemd[1]: Finished systemd-update-utmp.service. Jul 11 00:47:01.203000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 11 00:47:01.203571 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Jul 11 00:47:01.203686 systemd[1]: Finished modprobe@dm_mod.service. Jul 11 00:47:01.204000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 11 00:47:01.204000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 11 00:47:01.204919 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Jul 11 00:47:01.205035 systemd[1]: Finished modprobe@efi_pstore.service. Jul 11 00:47:01.205000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 11 00:47:01.205000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 11 00:47:01.206298 systemd[1]: modprobe@loop.service: Deactivated successfully. Jul 11 00:47:01.206410 systemd[1]: Finished modprobe@loop.service. Jul 11 00:47:01.207000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 11 00:47:01.207000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 11 00:47:01.207573 systemd[1]: Finished systemd-update-done.service. Jul 11 00:47:01.208000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-done comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 11 00:47:01.211381 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Jul 11 00:47:01.212560 systemd[1]: Starting modprobe@dm_mod.service... Jul 11 00:47:01.214612 systemd[1]: Starting modprobe@drm.service... Jul 11 00:47:01.216380 systemd[1]: Starting modprobe@efi_pstore.service... Jul 11 00:47:01.218284 systemd[1]: Starting modprobe@loop.service... Jul 11 00:47:01.219060 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Jul 11 00:47:01.219201 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Jul 11 00:47:01.220444 systemd[1]: Starting systemd-networkd-wait-online.service... Jul 11 00:47:01.221533 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Jul 11 00:47:01.222488 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Jul 11 00:47:01.222605 systemd[1]: Finished modprobe@dm_mod.service. Jul 11 00:47:01.223000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 11 00:47:01.223000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 11 00:47:01.223791 systemd[1]: modprobe@drm.service: Deactivated successfully. Jul 11 00:47:01.223896 systemd[1]: Finished modprobe@drm.service. Jul 11 00:47:01.223992 systemd-resolved[1156]: Positive Trust Anchors: Jul 11 00:47:01.224002 systemd-resolved[1156]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Jul 11 00:47:01.224030 systemd-resolved[1156]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Jul 11 00:47:01.224000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 11 00:47:01.224000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 11 00:47:01.225142 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Jul 11 00:47:01.225252 systemd[1]: Finished modprobe@efi_pstore.service. Jul 11 00:47:01.226000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 11 00:47:01.226000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 11 00:47:01.226479 systemd[1]: modprobe@loop.service: Deactivated successfully. Jul 11 00:47:01.226586 systemd[1]: Finished modprobe@loop.service. Jul 11 00:47:01.227000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 11 00:47:01.227000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 11 00:47:01.227944 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Jul 11 00:47:01.228050 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Jul 11 00:47:01.231000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ensure-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 11 00:47:01.230070 systemd[1]: Finished ensure-sysext.service. Jul 11 00:47:01.231000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Jul 11 00:47:01.231000 audit[1185]: SYSCALL arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=ffffcb60cb40 a2=420 a3=0 items=0 ppid=1152 pid=1185 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 11 00:47:01.231000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Jul 11 00:47:01.231757 augenrules[1185]: No rules Jul 11 00:47:01.232157 systemd[1]: Finished audit-rules.service. Jul 11 00:47:01.233050 systemd[1]: Started systemd-timesyncd.service. Jul 11 00:47:01.233357 systemd-timesyncd[1157]: Contacted time server 10.0.0.1:123 (10.0.0.1). Jul 11 00:47:01.233733 systemd-timesyncd[1157]: Initial clock synchronization to Fri 2025-07-11 00:47:01.096706 UTC. Jul 11 00:47:01.234125 systemd[1]: Reached target time-set.target. Jul 11 00:47:01.235074 systemd-resolved[1156]: Defaulting to hostname 'linux'. Jul 11 00:47:01.236514 systemd[1]: Started systemd-resolved.service. Jul 11 00:47:01.237475 systemd[1]: Reached target network.target. Jul 11 00:47:01.238222 systemd[1]: Reached target nss-lookup.target. Jul 11 00:47:01.238981 systemd[1]: Reached target sysinit.target. Jul 11 00:47:01.239861 systemd[1]: Started motdgen.path. Jul 11 00:47:01.240589 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Jul 11 00:47:01.241774 systemd[1]: Started logrotate.timer. Jul 11 00:47:01.242580 systemd[1]: Started mdadm.timer. Jul 11 00:47:01.243271 systemd[1]: Started systemd-tmpfiles-clean.timer. Jul 11 00:47:01.244066 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Jul 11 00:47:01.244135 systemd[1]: Reached target paths.target. Jul 11 00:47:01.244832 systemd[1]: Reached target timers.target. Jul 11 00:47:01.245864 systemd[1]: Listening on dbus.socket. Jul 11 00:47:01.247548 systemd[1]: Starting docker.socket... Jul 11 00:47:01.250610 systemd[1]: Listening on sshd.socket. Jul 11 00:47:01.251428 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Jul 11 00:47:01.251826 systemd[1]: Listening on docker.socket. Jul 11 00:47:01.252656 systemd[1]: Reached target sockets.target. Jul 11 00:47:01.253426 systemd[1]: Reached target basic.target. Jul 11 00:47:01.254191 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Jul 11 00:47:01.254223 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Jul 11 00:47:01.255165 systemd[1]: Starting containerd.service... Jul 11 00:47:01.256807 systemd[1]: Starting dbus.service... Jul 11 00:47:01.258443 systemd[1]: Starting enable-oem-cloudinit.service... Jul 11 00:47:01.260326 systemd[1]: Starting extend-filesystems.service... Jul 11 00:47:01.261191 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Jul 11 00:47:01.262537 systemd[1]: Starting motdgen.service... Jul 11 00:47:01.265827 systemd[1]: Starting ssh-key-proc-cmdline.service... Jul 11 00:47:01.268430 systemd[1]: Starting sshd-keygen.service... Jul 11 00:47:01.271776 jq[1195]: false Jul 11 00:47:01.271080 systemd[1]: Starting systemd-logind.service... Jul 11 00:47:01.271939 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Jul 11 00:47:01.271999 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). Jul 11 00:47:01.272413 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Jul 11 00:47:01.273051 systemd[1]: Starting update-engine.service... Jul 11 00:47:01.275011 systemd[1]: Starting update-ssh-keys-after-ignition.service... Jul 11 00:47:01.277952 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Jul 11 00:47:01.279213 jq[1209]: true Jul 11 00:47:01.278140 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Jul 11 00:47:01.278417 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Jul 11 00:47:01.278549 systemd[1]: Finished ssh-key-proc-cmdline.service. Jul 11 00:47:01.280396 extend-filesystems[1196]: Found loop1 Jul 11 00:47:01.280396 extend-filesystems[1196]: Found vda Jul 11 00:47:01.280396 extend-filesystems[1196]: Found vda1 Jul 11 00:47:01.280396 extend-filesystems[1196]: Found vda2 Jul 11 00:47:01.280396 extend-filesystems[1196]: Found vda3 Jul 11 00:47:01.280396 extend-filesystems[1196]: Found usr Jul 11 00:47:01.280396 extend-filesystems[1196]: Found vda4 Jul 11 00:47:01.280396 extend-filesystems[1196]: Found vda6 Jul 11 00:47:01.280396 extend-filesystems[1196]: Found vda7 Jul 11 00:47:01.280396 extend-filesystems[1196]: Found vda9 Jul 11 00:47:01.280396 extend-filesystems[1196]: Checking size of /dev/vda9 Jul 11 00:47:01.290326 systemd[1]: motdgen.service: Deactivated successfully. Jul 11 00:47:01.299207 jq[1213]: true Jul 11 00:47:01.290489 systemd[1]: Finished motdgen.service. Jul 11 00:47:01.304076 extend-filesystems[1196]: Resized partition /dev/vda9 Jul 11 00:47:01.304796 dbus-daemon[1194]: [system] SELinux support is enabled Jul 11 00:47:01.304961 systemd[1]: Started dbus.service. Jul 11 00:47:01.307843 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Jul 11 00:47:01.307859 systemd[1]: Reached target system-config.target. Jul 11 00:47:01.309046 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Jul 11 00:47:01.309068 systemd[1]: Reached target user-config.target. Jul 11 00:47:01.320577 extend-filesystems[1231]: resize2fs 1.46.5 (30-Dec-2021) Jul 11 00:47:01.346356 kernel: EXT4-fs (vda9): resizing filesystem from 553472 to 1864699 blocks Jul 11 00:47:01.362168 update_engine[1208]: I0711 00:47:01.361814 1208 main.cc:92] Flatcar Update Engine starting Jul 11 00:47:01.365807 systemd-logind[1205]: Watching system buttons on /dev/input/event0 (Power Button) Jul 11 00:47:01.366192 systemd[1]: Started update-engine.service. Jul 11 00:47:01.366664 systemd-logind[1205]: New seat seat0. Jul 11 00:47:01.368961 systemd[1]: Started locksmithd.service. Jul 11 00:47:01.371773 systemd[1]: Started systemd-logind.service. Jul 11 00:47:01.373263 update_engine[1208]: I0711 00:47:01.372005 1208 update_check_scheduler.cc:74] Next update check in 3m57s Jul 11 00:47:01.374132 kernel: EXT4-fs (vda9): resized filesystem to 1864699 Jul 11 00:47:01.386080 extend-filesystems[1231]: Filesystem at /dev/vda9 is mounted on /; on-line resizing required Jul 11 00:47:01.386080 extend-filesystems[1231]: old_desc_blocks = 1, new_desc_blocks = 1 Jul 11 00:47:01.386080 extend-filesystems[1231]: The filesystem on /dev/vda9 is now 1864699 (4k) blocks long. Jul 11 00:47:01.390146 extend-filesystems[1196]: Resized filesystem in /dev/vda9 Jul 11 00:47:01.391056 env[1214]: time="2025-07-11T00:47:01.387528600Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Jul 11 00:47:01.390560 systemd[1]: extend-filesystems.service: Deactivated successfully. Jul 11 00:47:01.390719 systemd[1]: Finished extend-filesystems.service. Jul 11 00:47:01.394499 bash[1242]: Updated "/home/core/.ssh/authorized_keys" Jul 11 00:47:01.395250 systemd[1]: Finished update-ssh-keys-after-ignition.service. Jul 11 00:47:01.412103 env[1214]: time="2025-07-11T00:47:01.412052400Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Jul 11 00:47:01.412239 env[1214]: time="2025-07-11T00:47:01.412220000Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Jul 11 00:47:01.414168 env[1214]: time="2025-07-11T00:47:01.414130760Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.186-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Jul 11 00:47:01.414168 env[1214]: time="2025-07-11T00:47:01.414163680Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Jul 11 00:47:01.414392 env[1214]: time="2025-07-11T00:47:01.414359400Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Jul 11 00:47:01.414392 env[1214]: time="2025-07-11T00:47:01.414382440Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Jul 11 00:47:01.414447 env[1214]: time="2025-07-11T00:47:01.414396560Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Jul 11 00:47:01.414447 env[1214]: time="2025-07-11T00:47:01.414406800Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Jul 11 00:47:01.414485 env[1214]: time="2025-07-11T00:47:01.414477160Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Jul 11 00:47:01.414693 env[1214]: time="2025-07-11T00:47:01.414662720Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Jul 11 00:47:01.414810 env[1214]: time="2025-07-11T00:47:01.414783080Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Jul 11 00:47:01.414810 env[1214]: time="2025-07-11T00:47:01.414804160Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Jul 11 00:47:01.414866 env[1214]: time="2025-07-11T00:47:01.414852240Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Jul 11 00:47:01.414897 env[1214]: time="2025-07-11T00:47:01.414868240Z" level=info msg="metadata content store policy set" policy=shared Jul 11 00:47:01.417820 env[1214]: time="2025-07-11T00:47:01.417790560Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Jul 11 00:47:01.417820 env[1214]: time="2025-07-11T00:47:01.417823280Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Jul 11 00:47:01.417906 env[1214]: time="2025-07-11T00:47:01.417835320Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Jul 11 00:47:01.417906 env[1214]: time="2025-07-11T00:47:01.417875200Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Jul 11 00:47:01.417906 env[1214]: time="2025-07-11T00:47:01.417889680Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Jul 11 00:47:01.417906 env[1214]: time="2025-07-11T00:47:01.417902960Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Jul 11 00:47:01.418014 env[1214]: time="2025-07-11T00:47:01.417915040Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Jul 11 00:47:01.418290 env[1214]: time="2025-07-11T00:47:01.418269560Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Jul 11 00:47:01.418331 env[1214]: time="2025-07-11T00:47:01.418293240Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Jul 11 00:47:01.418331 env[1214]: time="2025-07-11T00:47:01.418306800Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Jul 11 00:47:01.418331 env[1214]: time="2025-07-11T00:47:01.418319760Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Jul 11 00:47:01.418386 env[1214]: time="2025-07-11T00:47:01.418332480Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Jul 11 00:47:01.418455 env[1214]: time="2025-07-11T00:47:01.418436720Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Jul 11 00:47:01.418528 env[1214]: time="2025-07-11T00:47:01.418515880Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Jul 11 00:47:01.418745 env[1214]: time="2025-07-11T00:47:01.418730520Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Jul 11 00:47:01.418807 env[1214]: time="2025-07-11T00:47:01.418757960Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Jul 11 00:47:01.418807 env[1214]: time="2025-07-11T00:47:01.418770920Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Jul 11 00:47:01.418892 env[1214]: time="2025-07-11T00:47:01.418879040Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Jul 11 00:47:01.418919 env[1214]: time="2025-07-11T00:47:01.418894920Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Jul 11 00:47:01.418919 env[1214]: time="2025-07-11T00:47:01.418907400Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Jul 11 00:47:01.418956 env[1214]: time="2025-07-11T00:47:01.418918480Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Jul 11 00:47:01.418956 env[1214]: time="2025-07-11T00:47:01.418930040Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Jul 11 00:47:01.418956 env[1214]: time="2025-07-11T00:47:01.418941560Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Jul 11 00:47:01.418956 env[1214]: time="2025-07-11T00:47:01.418951840Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Jul 11 00:47:01.419056 env[1214]: time="2025-07-11T00:47:01.418964640Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Jul 11 00:47:01.419056 env[1214]: time="2025-07-11T00:47:01.418977160Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Jul 11 00:47:01.419146 env[1214]: time="2025-07-11T00:47:01.419098080Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Jul 11 00:47:01.419174 env[1214]: time="2025-07-11T00:47:01.419152480Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Jul 11 00:47:01.419174 env[1214]: time="2025-07-11T00:47:01.419167280Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Jul 11 00:47:01.419211 env[1214]: time="2025-07-11T00:47:01.419178440Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Jul 11 00:47:01.419211 env[1214]: time="2025-07-11T00:47:01.419192480Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Jul 11 00:47:01.419211 env[1214]: time="2025-07-11T00:47:01.419203240Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Jul 11 00:47:01.419299 env[1214]: time="2025-07-11T00:47:01.419219040Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Jul 11 00:47:01.419299 env[1214]: time="2025-07-11T00:47:01.419254720Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Jul 11 00:47:01.419482 env[1214]: time="2025-07-11T00:47:01.419433200Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Jul 11 00:47:01.420056 env[1214]: time="2025-07-11T00:47:01.419490800Z" level=info msg="Connect containerd service" Jul 11 00:47:01.420056 env[1214]: time="2025-07-11T00:47:01.419519920Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Jul 11 00:47:01.420180 env[1214]: time="2025-07-11T00:47:01.420160520Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Jul 11 00:47:01.420879 env[1214]: time="2025-07-11T00:47:01.420474960Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Jul 11 00:47:01.420879 env[1214]: time="2025-07-11T00:47:01.420515000Z" level=info msg=serving... address=/run/containerd/containerd.sock Jul 11 00:47:01.420879 env[1214]: time="2025-07-11T00:47:01.420554000Z" level=info msg="containerd successfully booted in 0.046083s" Jul 11 00:47:01.420879 env[1214]: time="2025-07-11T00:47:01.420540200Z" level=info msg="Start subscribing containerd event" Jul 11 00:47:01.420879 env[1214]: time="2025-07-11T00:47:01.420622880Z" level=info msg="Start recovering state" Jul 11 00:47:01.420879 env[1214]: time="2025-07-11T00:47:01.420688000Z" level=info msg="Start event monitor" Jul 11 00:47:01.420879 env[1214]: time="2025-07-11T00:47:01.420709200Z" level=info msg="Start snapshots syncer" Jul 11 00:47:01.420879 env[1214]: time="2025-07-11T00:47:01.420719240Z" level=info msg="Start cni network conf syncer for default" Jul 11 00:47:01.420879 env[1214]: time="2025-07-11T00:47:01.420726400Z" level=info msg="Start streaming server" Jul 11 00:47:01.420633 systemd[1]: Started containerd.service. Jul 11 00:47:01.429949 locksmithd[1244]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Jul 11 00:47:02.348279 systemd-networkd[1057]: eth0: Gained IPv6LL Jul 11 00:47:02.350331 systemd[1]: Finished systemd-networkd-wait-online.service. Jul 11 00:47:02.351483 systemd[1]: Reached target network-online.target. Jul 11 00:47:02.353716 systemd[1]: Starting kubelet.service... Jul 11 00:47:02.938035 systemd[1]: Started kubelet.service. Jul 11 00:47:03.370776 kubelet[1257]: E0711 00:47:03.370718 1257 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Jul 11 00:47:03.372847 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Jul 11 00:47:03.372977 systemd[1]: kubelet.service: Failed with result 'exit-code'. Jul 11 00:47:04.218142 sshd_keygen[1210]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Jul 11 00:47:04.235244 systemd[1]: Finished sshd-keygen.service. Jul 11 00:47:04.237437 systemd[1]: Starting issuegen.service... Jul 11 00:47:04.241643 systemd[1]: issuegen.service: Deactivated successfully. Jul 11 00:47:04.241788 systemd[1]: Finished issuegen.service. Jul 11 00:47:04.243719 systemd[1]: Starting systemd-user-sessions.service... Jul 11 00:47:04.249363 systemd[1]: Finished systemd-user-sessions.service. Jul 11 00:47:04.251368 systemd[1]: Started getty@tty1.service. Jul 11 00:47:04.253313 systemd[1]: Started serial-getty@ttyAMA0.service. Jul 11 00:47:04.254338 systemd[1]: Reached target getty.target. Jul 11 00:47:04.255134 systemd[1]: Reached target multi-user.target. Jul 11 00:47:04.256928 systemd[1]: Starting systemd-update-utmp-runlevel.service... Jul 11 00:47:04.262851 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Jul 11 00:47:04.262991 systemd[1]: Finished systemd-update-utmp-runlevel.service. Jul 11 00:47:04.264054 systemd[1]: Startup finished in 598ms (kernel) + 4.457s (initrd) + 6.235s (userspace) = 11.290s. Jul 11 00:47:05.893350 systemd[1]: Created slice system-sshd.slice. Jul 11 00:47:05.894463 systemd[1]: Started sshd@0-10.0.0.4:22-10.0.0.1:57646.service. Jul 11 00:47:05.934204 sshd[1279]: Accepted publickey for core from 10.0.0.1 port 57646 ssh2: RSA SHA256:DO2RFOHl/GvUCVdCGSWUeFt6wdih0tefOeEyRQ07TAM Jul 11 00:47:05.936382 sshd[1279]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 11 00:47:05.943823 systemd[1]: Created slice user-500.slice. Jul 11 00:47:05.944879 systemd[1]: Starting user-runtime-dir@500.service... Jul 11 00:47:05.946338 systemd-logind[1205]: New session 1 of user core. Jul 11 00:47:05.952495 systemd[1]: Finished user-runtime-dir@500.service. Jul 11 00:47:05.953703 systemd[1]: Starting user@500.service... Jul 11 00:47:05.956423 (systemd)[1282]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Jul 11 00:47:06.013489 systemd[1282]: Queued start job for default target default.target. Jul 11 00:47:06.013982 systemd[1282]: Reached target paths.target. Jul 11 00:47:06.014015 systemd[1282]: Reached target sockets.target. Jul 11 00:47:06.014026 systemd[1282]: Reached target timers.target. Jul 11 00:47:06.014036 systemd[1282]: Reached target basic.target. Jul 11 00:47:06.014079 systemd[1282]: Reached target default.target. Jul 11 00:47:06.014126 systemd[1282]: Startup finished in 52ms. Jul 11 00:47:06.014176 systemd[1]: Started user@500.service. Jul 11 00:47:06.015125 systemd[1]: Started session-1.scope. Jul 11 00:47:06.067231 systemd[1]: Started sshd@1-10.0.0.4:22-10.0.0.1:57648.service. Jul 11 00:47:06.113421 sshd[1291]: Accepted publickey for core from 10.0.0.1 port 57648 ssh2: RSA SHA256:DO2RFOHl/GvUCVdCGSWUeFt6wdih0tefOeEyRQ07TAM Jul 11 00:47:06.114668 sshd[1291]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 11 00:47:06.118210 systemd-logind[1205]: New session 2 of user core. Jul 11 00:47:06.119414 systemd[1]: Started session-2.scope. Jul 11 00:47:06.173450 sshd[1291]: pam_unix(sshd:session): session closed for user core Jul 11 00:47:06.176689 systemd[1]: sshd@1-10.0.0.4:22-10.0.0.1:57648.service: Deactivated successfully. Jul 11 00:47:06.177305 systemd[1]: session-2.scope: Deactivated successfully. Jul 11 00:47:06.177799 systemd-logind[1205]: Session 2 logged out. Waiting for processes to exit. Jul 11 00:47:06.178802 systemd[1]: Started sshd@2-10.0.0.4:22-10.0.0.1:57652.service. Jul 11 00:47:06.179516 systemd-logind[1205]: Removed session 2. Jul 11 00:47:06.210008 sshd[1297]: Accepted publickey for core from 10.0.0.1 port 57652 ssh2: RSA SHA256:DO2RFOHl/GvUCVdCGSWUeFt6wdih0tefOeEyRQ07TAM Jul 11 00:47:06.211560 sshd[1297]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 11 00:47:06.214848 systemd-logind[1205]: New session 3 of user core. Jul 11 00:47:06.215660 systemd[1]: Started session-3.scope. Jul 11 00:47:06.264772 sshd[1297]: pam_unix(sshd:session): session closed for user core Jul 11 00:47:06.268695 systemd[1]: sshd@2-10.0.0.4:22-10.0.0.1:57652.service: Deactivated successfully. Jul 11 00:47:06.269273 systemd[1]: session-3.scope: Deactivated successfully. Jul 11 00:47:06.269782 systemd-logind[1205]: Session 3 logged out. Waiting for processes to exit. Jul 11 00:47:06.270786 systemd[1]: Started sshd@3-10.0.0.4:22-10.0.0.1:57662.service. Jul 11 00:47:06.271474 systemd-logind[1205]: Removed session 3. Jul 11 00:47:06.301901 sshd[1303]: Accepted publickey for core from 10.0.0.1 port 57662 ssh2: RSA SHA256:DO2RFOHl/GvUCVdCGSWUeFt6wdih0tefOeEyRQ07TAM Jul 11 00:47:06.303264 sshd[1303]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 11 00:47:06.306182 systemd-logind[1205]: New session 4 of user core. Jul 11 00:47:06.306917 systemd[1]: Started session-4.scope. Jul 11 00:47:06.359634 sshd[1303]: pam_unix(sshd:session): session closed for user core Jul 11 00:47:06.363027 systemd[1]: Started sshd@4-10.0.0.4:22-10.0.0.1:57664.service. Jul 11 00:47:06.363579 systemd[1]: sshd@3-10.0.0.4:22-10.0.0.1:57662.service: Deactivated successfully. Jul 11 00:47:06.364211 systemd[1]: session-4.scope: Deactivated successfully. Jul 11 00:47:06.364679 systemd-logind[1205]: Session 4 logged out. Waiting for processes to exit. Jul 11 00:47:06.365388 systemd-logind[1205]: Removed session 4. Jul 11 00:47:06.395007 sshd[1308]: Accepted publickey for core from 10.0.0.1 port 57664 ssh2: RSA SHA256:DO2RFOHl/GvUCVdCGSWUeFt6wdih0tefOeEyRQ07TAM Jul 11 00:47:06.396169 sshd[1308]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 11 00:47:06.399405 systemd-logind[1205]: New session 5 of user core. Jul 11 00:47:06.400185 systemd[1]: Started session-5.scope. Jul 11 00:47:06.459290 sudo[1312]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Jul 11 00:47:06.459507 sudo[1312]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Jul 11 00:47:06.471302 dbus-daemon[1194]: avc: received setenforce notice (enforcing=1) Jul 11 00:47:06.473069 sudo[1312]: pam_unix(sudo:session): session closed for user root Jul 11 00:47:06.474871 sshd[1308]: pam_unix(sshd:session): session closed for user core Jul 11 00:47:06.478930 systemd[1]: sshd@4-10.0.0.4:22-10.0.0.1:57664.service: Deactivated successfully. Jul 11 00:47:06.479497 systemd[1]: session-5.scope: Deactivated successfully. Jul 11 00:47:06.480008 systemd-logind[1205]: Session 5 logged out. Waiting for processes to exit. Jul 11 00:47:06.481071 systemd[1]: Started sshd@5-10.0.0.4:22-10.0.0.1:57670.service. Jul 11 00:47:06.481692 systemd-logind[1205]: Removed session 5. Jul 11 00:47:06.512555 sshd[1316]: Accepted publickey for core from 10.0.0.1 port 57670 ssh2: RSA SHA256:DO2RFOHl/GvUCVdCGSWUeFt6wdih0tefOeEyRQ07TAM Jul 11 00:47:06.513697 sshd[1316]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 11 00:47:06.516611 systemd-logind[1205]: New session 6 of user core. Jul 11 00:47:06.517359 systemd[1]: Started session-6.scope. Jul 11 00:47:06.568303 sudo[1320]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Jul 11 00:47:06.568522 sudo[1320]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Jul 11 00:47:06.571179 sudo[1320]: pam_unix(sudo:session): session closed for user root Jul 11 00:47:06.575226 sudo[1319]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Jul 11 00:47:06.575423 sudo[1319]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Jul 11 00:47:06.583067 systemd[1]: Stopping audit-rules.service... Jul 11 00:47:06.583000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Jul 11 00:47:06.586056 auditctl[1323]: No rules Jul 11 00:47:06.586532 kernel: kauditd_printk_skb: 132 callbacks suppressed Jul 11 00:47:06.586563 kernel: audit: type=1305 audit(1752194826.583:204): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Jul 11 00:47:06.586581 kernel: audit: type=1300 audit(1752194826.583:204): arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=ffffdb922a60 a2=420 a3=0 items=0 ppid=1 pid=1323 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 11 00:47:06.583000 audit[1323]: SYSCALL arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=ffffdb922a60 a2=420 a3=0 items=0 ppid=1 pid=1323 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 11 00:47:06.586898 systemd[1]: audit-rules.service: Deactivated successfully. Jul 11 00:47:06.587072 systemd[1]: Stopped audit-rules.service. Jul 11 00:47:06.588553 systemd[1]: Starting audit-rules.service... Jul 11 00:47:06.583000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Jul 11 00:47:06.591083 kernel: audit: type=1327 audit(1752194826.583:204): proctitle=2F7362696E2F617564697463746C002D44 Jul 11 00:47:06.591128 kernel: audit: type=1131 audit(1752194826.586:205): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 11 00:47:06.586000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 11 00:47:06.603831 augenrules[1340]: No rules Jul 11 00:47:06.603000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 11 00:47:06.604427 systemd[1]: Finished audit-rules.service. Jul 11 00:47:06.605230 sudo[1319]: pam_unix(sudo:session): session closed for user root Jul 11 00:47:06.604000 audit[1319]: USER_END pid=1319 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 11 00:47:06.607065 sshd[1316]: pam_unix(sshd:session): session closed for user core Jul 11 00:47:06.610488 kernel: audit: type=1130 audit(1752194826.603:206): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 11 00:47:06.610569 kernel: audit: type=1106 audit(1752194826.604:207): pid=1319 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 11 00:47:06.610592 kernel: audit: type=1104 audit(1752194826.604:208): pid=1319 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 11 00:47:06.604000 audit[1319]: CRED_DISP pid=1319 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 11 00:47:06.610003 systemd[1]: Started sshd@6-10.0.0.4:22-10.0.0.1:57684.service. Jul 11 00:47:06.610475 systemd[1]: sshd@5-10.0.0.4:22-10.0.0.1:57670.service: Deactivated successfully. Jul 11 00:47:06.611192 systemd[1]: session-6.scope: Deactivated successfully. Jul 11 00:47:06.611691 systemd-logind[1205]: Session 6 logged out. Waiting for processes to exit. Jul 11 00:47:06.612663 systemd-logind[1205]: Removed session 6. Jul 11 00:47:06.612796 kernel: audit: type=1106 audit(1752194826.607:209): pid=1316 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 11 00:47:06.607000 audit[1316]: USER_END pid=1316 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 11 00:47:06.607000 audit[1316]: CRED_DISP pid=1316 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 11 00:47:06.618907 kernel: audit: type=1104 audit(1752194826.607:210): pid=1316 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 11 00:47:06.618941 kernel: audit: type=1130 audit(1752194826.609:211): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.4:22-10.0.0.1:57684 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 11 00:47:06.609000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.4:22-10.0.0.1:57684 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 11 00:47:06.609000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.0.0.4:22-10.0.0.1:57670 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 11 00:47:06.642000 audit[1345]: USER_ACCT pid=1345 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 11 00:47:06.643722 sshd[1345]: Accepted publickey for core from 10.0.0.1 port 57684 ssh2: RSA SHA256:DO2RFOHl/GvUCVdCGSWUeFt6wdih0tefOeEyRQ07TAM Jul 11 00:47:06.644000 audit[1345]: CRED_ACQ pid=1345 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 11 00:47:06.644000 audit[1345]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffc7df3640 a2=3 a3=1 items=0 ppid=1 pid=1345 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=7 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 11 00:47:06.644000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 11 00:47:06.645046 sshd[1345]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 11 00:47:06.647800 systemd-logind[1205]: New session 7 of user core. Jul 11 00:47:06.648624 systemd[1]: Started session-7.scope. Jul 11 00:47:06.651000 audit[1345]: USER_START pid=1345 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 11 00:47:06.652000 audit[1348]: CRED_ACQ pid=1348 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 11 00:47:06.697000 audit[1349]: USER_ACCT pid=1349 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 11 00:47:06.698728 sudo[1349]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Jul 11 00:47:06.697000 audit[1349]: CRED_REFR pid=1349 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 11 00:47:06.699149 sudo[1349]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Jul 11 00:47:06.699000 audit[1349]: USER_START pid=1349 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 11 00:47:06.710389 systemd[1]: Starting coreos-metadata.service... Jul 11 00:47:06.717318 systemd[1]: coreos-metadata.service: Deactivated successfully. Jul 11 00:47:06.717477 systemd[1]: Finished coreos-metadata.service. Jul 11 00:47:06.716000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=coreos-metadata comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 11 00:47:06.716000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=coreos-metadata comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 11 00:47:07.185758 systemd[1]: Stopped kubelet.service. Jul 11 00:47:07.184000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 11 00:47:07.184000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 11 00:47:07.187685 systemd[1]: Starting kubelet.service... Jul 11 00:47:07.207002 systemd[1]: Reloading. Jul 11 00:47:07.269364 /usr/lib/systemd/system-generators/torcx-generator[1409]: time="2025-07-11T00:47:07Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" Jul 11 00:47:07.269395 /usr/lib/systemd/system-generators/torcx-generator[1409]: time="2025-07-11T00:47:07Z" level=info msg="torcx already run" Jul 11 00:47:07.360570 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Jul 11 00:47:07.360588 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Jul 11 00:47:07.375766 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Jul 11 00:47:07.422000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:07.422000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:07.422000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:07.422000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:07.422000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:07.422000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:07.423000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:07.423000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:07.423000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:07.423000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:07.423000 audit: BPF prog-id=40 op=LOAD Jul 11 00:47:07.423000 audit: BPF prog-id=38 op=UNLOAD Jul 11 00:47:07.424000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:07.424000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:07.424000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:07.424000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:07.424000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:07.424000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:07.424000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:07.424000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:07.424000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:07.424000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:07.424000 audit: BPF prog-id=41 op=LOAD Jul 11 00:47:07.424000 audit: BPF prog-id=24 op=UNLOAD Jul 11 00:47:07.424000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:07.424000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:07.424000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:07.424000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:07.424000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:07.424000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:07.424000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:07.424000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:07.424000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:07.424000 audit: BPF prog-id=42 op=LOAD Jul 11 00:47:07.424000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:07.424000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:07.424000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:07.424000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:07.424000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:07.424000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:07.424000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:07.424000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:07.424000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:07.424000 audit: BPF prog-id=43 op=LOAD Jul 11 00:47:07.424000 audit: BPF prog-id=25 op=UNLOAD Jul 11 00:47:07.424000 audit: BPF prog-id=26 op=UNLOAD Jul 11 00:47:07.424000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:07.424000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:07.424000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:07.424000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:07.425000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:07.425000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:07.425000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:07.425000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:07.425000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:07.425000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:07.425000 audit: BPF prog-id=44 op=LOAD Jul 11 00:47:07.425000 audit: BPF prog-id=33 op=UNLOAD Jul 11 00:47:07.426000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:07.426000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:07.426000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:07.426000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:07.426000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:07.426000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:07.426000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:07.426000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:07.426000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:07.426000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:07.426000 audit: BPF prog-id=45 op=LOAD Jul 11 00:47:07.426000 audit: BPF prog-id=35 op=UNLOAD Jul 11 00:47:07.427000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:07.427000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:07.427000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:07.427000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:07.427000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:07.427000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:07.427000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:07.427000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:07.427000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:07.427000 audit: BPF prog-id=46 op=LOAD Jul 11 00:47:07.427000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:07.427000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:07.427000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:07.427000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:07.427000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:07.427000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:07.427000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:07.427000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:07.427000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:07.427000 audit: BPF prog-id=47 op=LOAD Jul 11 00:47:07.427000 audit: BPF prog-id=36 op=UNLOAD Jul 11 00:47:07.427000 audit: BPF prog-id=37 op=UNLOAD Jul 11 00:47:07.427000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:07.427000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:07.427000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:07.427000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:07.427000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:07.427000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:07.427000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:07.427000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:07.427000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:07.428000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:07.428000 audit: BPF prog-id=48 op=LOAD Jul 11 00:47:07.428000 audit: BPF prog-id=27 op=UNLOAD Jul 11 00:47:07.428000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:07.428000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:07.428000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:07.428000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:07.428000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:07.428000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:07.428000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:07.428000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:07.428000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:07.428000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:07.428000 audit: BPF prog-id=49 op=LOAD Jul 11 00:47:07.428000 audit: BPF prog-id=34 op=UNLOAD Jul 11 00:47:07.429000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:07.429000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:07.429000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:07.429000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:07.429000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:07.429000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:07.429000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:07.429000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:07.429000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:07.429000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:07.429000 audit: BPF prog-id=50 op=LOAD Jul 11 00:47:07.429000 audit: BPF prog-id=28 op=UNLOAD Jul 11 00:47:07.429000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:07.429000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:07.429000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:07.429000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:07.429000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:07.429000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:07.429000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:07.429000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:07.429000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:07.429000 audit: BPF prog-id=51 op=LOAD Jul 11 00:47:07.429000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:07.429000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:07.429000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:07.429000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:07.429000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:07.429000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:07.429000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:07.429000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:07.429000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:07.429000 audit: BPF prog-id=52 op=LOAD Jul 11 00:47:07.429000 audit: BPF prog-id=29 op=UNLOAD Jul 11 00:47:07.429000 audit: BPF prog-id=30 op=UNLOAD Jul 11 00:47:07.429000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:07.429000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:07.429000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:07.429000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:07.429000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:07.429000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:07.429000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:07.429000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:07.429000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:07.429000 audit: BPF prog-id=53 op=LOAD Jul 11 00:47:07.429000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:07.429000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:07.429000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:07.429000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:07.429000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:07.429000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:07.429000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:07.429000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:07.429000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:07.429000 audit: BPF prog-id=54 op=LOAD Jul 11 00:47:07.429000 audit: BPF prog-id=31 op=UNLOAD Jul 11 00:47:07.429000 audit: BPF prog-id=32 op=UNLOAD Jul 11 00:47:07.441788 systemd[1]: Started kubelet.service. Jul 11 00:47:07.440000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 11 00:47:07.442970 systemd[1]: Stopping kubelet.service... Jul 11 00:47:07.443218 systemd[1]: kubelet.service: Deactivated successfully. Jul 11 00:47:07.443373 systemd[1]: Stopped kubelet.service. Jul 11 00:47:07.442000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 11 00:47:07.444736 systemd[1]: Starting kubelet.service... Jul 11 00:47:07.536933 systemd[1]: Started kubelet.service. Jul 11 00:47:07.536000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 11 00:47:07.566149 kubelet[1454]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Jul 11 00:47:07.566149 kubelet[1454]: Flag --pod-infra-container-image has been deprecated, will be removed in 1.35. Image garbage collector will get sandbox image information from CRI. Jul 11 00:47:07.566149 kubelet[1454]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Jul 11 00:47:07.566439 kubelet[1454]: I0711 00:47:07.566187 1454 server.go:212] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Jul 11 00:47:07.975559 kubelet[1454]: I0711 00:47:07.975511 1454 server.go:530] "Kubelet version" kubeletVersion="v1.33.0" Jul 11 00:47:07.975559 kubelet[1454]: I0711 00:47:07.975545 1454 server.go:532] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Jul 11 00:47:07.975791 kubelet[1454]: I0711 00:47:07.975764 1454 server.go:956] "Client rotation is on, will bootstrap in background" Jul 11 00:47:08.028278 kubelet[1454]: I0711 00:47:08.027938 1454 dynamic_cafile_content.go:161] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Jul 11 00:47:08.042393 kubelet[1454]: E0711 00:47:08.042284 1454 log.go:32] "RuntimeConfig from runtime service failed" err="rpc error: code = Unimplemented desc = unknown method RuntimeConfig for service runtime.v1.RuntimeService" Jul 11 00:47:08.042393 kubelet[1454]: I0711 00:47:08.042380 1454 server.go:1423] "CRI implementation should be updated to support RuntimeConfig when KubeletCgroupDriverFromCRI feature gate has been enabled. Falling back to using cgroupDriver from kubelet config." Jul 11 00:47:08.045763 kubelet[1454]: I0711 00:47:08.045733 1454 server.go:782] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Jul 11 00:47:08.046080 kubelet[1454]: I0711 00:47:08.046054 1454 container_manager_linux.go:267] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Jul 11 00:47:08.046520 kubelet[1454]: I0711 00:47:08.046077 1454 container_manager_linux.go:272] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"10.0.0.4","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"MemoryManagerPolicy":"None","MemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null,"CgroupVersion":2} Jul 11 00:47:08.046620 kubelet[1454]: I0711 00:47:08.046579 1454 topology_manager.go:138] "Creating topology manager with none policy" Jul 11 00:47:08.046620 kubelet[1454]: I0711 00:47:08.046591 1454 container_manager_linux.go:303] "Creating device plugin manager" Jul 11 00:47:08.046802 kubelet[1454]: I0711 00:47:08.046777 1454 state_mem.go:36] "Initialized new in-memory state store" Jul 11 00:47:08.056608 kubelet[1454]: I0711 00:47:08.056576 1454 kubelet.go:480] "Attempting to sync node with API server" Jul 11 00:47:08.056669 kubelet[1454]: I0711 00:47:08.056638 1454 kubelet.go:375] "Adding static pod path" path="/etc/kubernetes/manifests" Jul 11 00:47:08.056669 kubelet[1454]: I0711 00:47:08.056661 1454 kubelet.go:386] "Adding apiserver pod source" Jul 11 00:47:08.056709 kubelet[1454]: I0711 00:47:08.056674 1454 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Jul 11 00:47:08.056819 kubelet[1454]: E0711 00:47:08.056789 1454 file.go:98] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 11 00:47:08.056819 kubelet[1454]: E0711 00:47:08.056811 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 11 00:47:08.059094 kubelet[1454]: I0711 00:47:08.059059 1454 kuberuntime_manager.go:279] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Jul 11 00:47:08.059902 kubelet[1454]: I0711 00:47:08.059879 1454 kubelet.go:935] "Not starting ClusterTrustBundle informer because we are in static kubelet mode or the ClusterTrustBundleProjection featuregate is disabled" Jul 11 00:47:08.060073 kubelet[1454]: W0711 00:47:08.060062 1454 probe.go:272] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Jul 11 00:47:08.062278 kubelet[1454]: I0711 00:47:08.062260 1454 watchdog_linux.go:99] "Systemd watchdog is not enabled" Jul 11 00:47:08.062389 kubelet[1454]: I0711 00:47:08.062377 1454 server.go:1289] "Started kubelet" Jul 11 00:47:08.062944 kubelet[1454]: I0711 00:47:08.062900 1454 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 Jul 11 00:47:08.062000 audit[1454]: AVC avc: denied { mac_admin } for pid=1454 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:08.063678 kubelet[1454]: I0711 00:47:08.063618 1454 server.go:255] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Jul 11 00:47:08.062000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Jul 11 00:47:08.063753 kubelet[1454]: I0711 00:47:08.063737 1454 server.go:180] "Starting to listen" address="0.0.0.0" port=10250 Jul 11 00:47:08.062000 audit[1454]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000a21860 a1=4000123ea8 a2=4000a21830 a3=25 items=0 ppid=1 pid=1454 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 11 00:47:08.062000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Jul 11 00:47:08.063951 kubelet[1454]: I0711 00:47:08.063922 1454 kubelet.go:1552] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/plugins_registry: invalid argument" Jul 11 00:47:08.062000 audit[1454]: AVC avc: denied { mac_admin } for pid=1454 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:08.062000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Jul 11 00:47:08.062000 audit[1454]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=40003cf9e0 a1=4000123ec0 a2=4000a218f0 a3=25 items=0 ppid=1 pid=1454 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 11 00:47:08.062000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Jul 11 00:47:08.064250 kubelet[1454]: I0711 00:47:08.064224 1454 kubelet.go:1556] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/plugins: invalid argument" Jul 11 00:47:08.064382 kubelet[1454]: I0711 00:47:08.064367 1454 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Jul 11 00:47:08.064674 kubelet[1454]: I0711 00:47:08.064634 1454 server.go:317] "Adding debug handlers to kubelet server" Jul 11 00:47:08.068648 kubelet[1454]: I0711 00:47:08.068621 1454 dynamic_serving_content.go:135] "Starting controller" name="kubelet-server-cert-files::/var/lib/kubelet/pki/kubelet.crt::/var/lib/kubelet/pki/kubelet.key" Jul 11 00:47:08.069464 kubelet[1454]: E0711 00:47:08.068629 1454 kubelet.go:1600] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Jul 11 00:47:08.070021 kubelet[1454]: E0711 00:47:08.069984 1454 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"10.0.0.4\" not found" Jul 11 00:47:08.070067 kubelet[1454]: I0711 00:47:08.070025 1454 volume_manager.go:297] "Starting Kubelet Volume Manager" Jul 11 00:47:08.070230 kubelet[1454]: I0711 00:47:08.070206 1454 desired_state_of_world_populator.go:150] "Desired state populator starts to run" Jul 11 00:47:08.070281 kubelet[1454]: I0711 00:47:08.070260 1454 reconciler.go:26] "Reconciler: start to sync state" Jul 11 00:47:08.072180 kubelet[1454]: I0711 00:47:08.072152 1454 factory.go:223] Registration of the containerd container factory successfully Jul 11 00:47:08.072180 kubelet[1454]: I0711 00:47:08.072181 1454 factory.go:223] Registration of the systemd container factory successfully Jul 11 00:47:08.072290 kubelet[1454]: I0711 00:47:08.072270 1454 factory.go:221] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory Jul 11 00:47:08.088067 kubelet[1454]: E0711 00:47:08.087492 1454 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"10.0.0.4\" not found" node="10.0.0.4" Jul 11 00:47:08.088067 kubelet[1454]: I0711 00:47:08.087768 1454 cpu_manager.go:221] "Starting CPU manager" policy="none" Jul 11 00:47:08.088067 kubelet[1454]: I0711 00:47:08.087779 1454 cpu_manager.go:222] "Reconciling" reconcilePeriod="10s" Jul 11 00:47:08.088067 kubelet[1454]: I0711 00:47:08.087799 1454 state_mem.go:36] "Initialized new in-memory state store" Jul 11 00:47:08.170949 kubelet[1454]: E0711 00:47:08.170908 1454 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"10.0.0.4\" not found" Jul 11 00:47:08.179072 kubelet[1454]: I0711 00:47:08.179052 1454 policy_none.go:49] "None policy: Start" Jul 11 00:47:08.179136 kubelet[1454]: I0711 00:47:08.179078 1454 memory_manager.go:186] "Starting memorymanager" policy="None" Jul 11 00:47:08.179136 kubelet[1454]: I0711 00:47:08.179091 1454 state_mem.go:35] "Initializing new in-memory state store" Jul 11 00:47:08.183766 systemd[1]: Created slice kubepods.slice. Jul 11 00:47:08.184000 audit[1480]: NETFILTER_CFG table=mangle:2 family=2 entries=2 op=nft_register_chain pid=1480 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 11 00:47:08.184000 audit[1480]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=ffffe4ee11a0 a2=0 a3=1 items=0 ppid=1454 pid=1480 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 11 00:47:08.184000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Jul 11 00:47:08.185000 audit[1481]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=1481 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 11 00:47:08.185000 audit[1481]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=132 a0=3 a1=ffffc49bbb00 a2=0 a3=1 items=0 ppid=1454 pid=1481 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 11 00:47:08.185000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Jul 11 00:47:08.187868 systemd[1]: Created slice kubepods-burstable.slice. Jul 11 00:47:08.190624 systemd[1]: Created slice kubepods-besteffort.slice. Jul 11 00:47:08.205707 kubelet[1454]: E0711 00:47:08.205684 1454 manager.go:517] "Failed to read data from checkpoint" err="checkpoint is not found" checkpoint="kubelet_internal_checkpoint" Jul 11 00:47:08.205000 audit[1454]: AVC avc: denied { mac_admin } for pid=1454 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:08.205000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Jul 11 00:47:08.205000 audit[1454]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000ebf560 a1=4000e41d70 a2=4000ebf530 a3=25 items=0 ppid=1 pid=1454 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 11 00:47:08.205000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Jul 11 00:47:08.205927 kubelet[1454]: E0711 00:47:08.205748 1454 server.go:94] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/device-plugins/: invalid argument" path="/var/lib/kubelet/device-plugins/" Jul 11 00:47:08.205927 kubelet[1454]: I0711 00:47:08.205843 1454 eviction_manager.go:189] "Eviction manager: starting control loop" Jul 11 00:47:08.205927 kubelet[1454]: I0711 00:47:08.205854 1454 container_log_manager.go:189] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" Jul 11 00:47:08.206087 kubelet[1454]: I0711 00:47:08.206063 1454 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Jul 11 00:47:08.207371 kubelet[1454]: E0711 00:47:08.207351 1454 eviction_manager.go:267] "eviction manager: failed to check if we have separate container filesystem. Ignoring." err="no imagefs label for configured runtime" Jul 11 00:47:08.207431 kubelet[1454]: E0711 00:47:08.207391 1454 eviction_manager.go:292] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"10.0.0.4\" not found" Jul 11 00:47:08.188000 audit[1483]: NETFILTER_CFG table=filter:4 family=2 entries=2 op=nft_register_chain pid=1483 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 11 00:47:08.188000 audit[1483]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=312 a0=3 a1=fffff79bbed0 a2=0 a3=1 items=0 ppid=1454 pid=1483 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 11 00:47:08.188000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Jul 11 00:47:08.217000 audit[1488]: NETFILTER_CFG table=filter:5 family=2 entries=2 op=nft_register_chain pid=1488 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 11 00:47:08.217000 audit[1488]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=312 a0=3 a1=fffffeed82b0 a2=0 a3=1 items=0 ppid=1454 pid=1488 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 11 00:47:08.217000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Jul 11 00:47:08.248000 audit[1493]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=1493 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 11 00:47:08.248000 audit[1493]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=924 a0=3 a1=ffffe03f9240 a2=0 a3=1 items=0 ppid=1454 pid=1493 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 11 00:47:08.248000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Jul 11 00:47:08.249646 kubelet[1454]: I0711 00:47:08.249612 1454 kubelet_network_linux.go:49] "Initialized iptables rules." protocol="IPv4" Jul 11 00:47:08.249000 audit[1494]: NETFILTER_CFG table=mangle:7 family=10 entries=2 op=nft_register_chain pid=1494 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 11 00:47:08.249000 audit[1494]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=ffffd9f18fa0 a2=0 a3=1 items=0 ppid=1454 pid=1494 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 11 00:47:08.249000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Jul 11 00:47:08.251085 kubelet[1454]: I0711 00:47:08.251061 1454 kubelet_network_linux.go:49] "Initialized iptables rules." protocol="IPv6" Jul 11 00:47:08.251085 kubelet[1454]: I0711 00:47:08.251090 1454 status_manager.go:230] "Starting to sync pod status with apiserver" Jul 11 00:47:08.251237 kubelet[1454]: I0711 00:47:08.251212 1454 watchdog_linux.go:127] "Systemd watchdog is not enabled or the interval is invalid, so health checking will not be started." Jul 11 00:47:08.251237 kubelet[1454]: I0711 00:47:08.251234 1454 kubelet.go:2436] "Starting kubelet main sync loop" Jul 11 00:47:08.251366 kubelet[1454]: E0711 00:47:08.251347 1454 kubelet.go:2460] "Skipping pod synchronization" err="PLEG is not healthy: pleg has yet to be successful" Jul 11 00:47:08.251000 audit[1495]: NETFILTER_CFG table=mangle:8 family=2 entries=1 op=nft_register_chain pid=1495 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 11 00:47:08.251000 audit[1495]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=fffff4a0eaa0 a2=0 a3=1 items=0 ppid=1454 pid=1495 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 11 00:47:08.251000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Jul 11 00:47:08.251000 audit[1496]: NETFILTER_CFG table=mangle:9 family=10 entries=1 op=nft_register_chain pid=1496 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 11 00:47:08.251000 audit[1496]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffedd62c10 a2=0 a3=1 items=0 ppid=1454 pid=1496 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 11 00:47:08.251000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Jul 11 00:47:08.252000 audit[1497]: NETFILTER_CFG table=nat:10 family=10 entries=2 op=nft_register_chain pid=1497 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 11 00:47:08.252000 audit[1497]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=128 a0=3 a1=ffffe8f2bbc0 a2=0 a3=1 items=0 ppid=1454 pid=1497 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 11 00:47:08.252000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Jul 11 00:47:08.252000 audit[1498]: NETFILTER_CFG table=nat:11 family=2 entries=2 op=nft_register_chain pid=1498 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 11 00:47:08.252000 audit[1498]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=128 a0=3 a1=ffffc0ef5a60 a2=0 a3=1 items=0 ppid=1454 pid=1498 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 11 00:47:08.252000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Jul 11 00:47:08.253000 audit[1500]: NETFILTER_CFG table=filter:12 family=2 entries=1 op=nft_register_chain pid=1500 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 11 00:47:08.253000 audit[1500]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffc2753a20 a2=0 a3=1 items=0 ppid=1454 pid=1500 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 11 00:47:08.253000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Jul 11 00:47:08.253000 audit[1499]: NETFILTER_CFG table=filter:13 family=10 entries=2 op=nft_register_chain pid=1499 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 11 00:47:08.253000 audit[1499]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=ffffdcccef80 a2=0 a3=1 items=0 ppid=1454 pid=1499 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 11 00:47:08.253000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Jul 11 00:47:08.306973 kubelet[1454]: I0711 00:47:08.306946 1454 kubelet_node_status.go:75] "Attempting to register node" node="10.0.0.4" Jul 11 00:47:08.310567 kubelet[1454]: I0711 00:47:08.310540 1454 kubelet_node_status.go:78] "Successfully registered node" node="10.0.0.4" Jul 11 00:47:08.417100 kubelet[1454]: I0711 00:47:08.417066 1454 kuberuntime_manager.go:1746] "Updating runtime config through cri with podcidr" CIDR="192.168.1.0/24" Jul 11 00:47:08.417757 env[1214]: time="2025-07-11T00:47:08.417641179Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Jul 11 00:47:08.418006 kubelet[1454]: I0711 00:47:08.417841 1454 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.1.0/24" Jul 11 00:47:08.564156 sudo[1349]: pam_unix(sudo:session): session closed for user root Jul 11 00:47:08.563000 audit[1349]: USER_END pid=1349 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 11 00:47:08.563000 audit[1349]: CRED_DISP pid=1349 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 11 00:47:08.565442 sshd[1345]: pam_unix(sshd:session): session closed for user core Jul 11 00:47:08.565000 audit[1345]: USER_END pid=1345 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 11 00:47:08.565000 audit[1345]: CRED_DISP pid=1345 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 11 00:47:08.568175 systemd[1]: sshd@6-10.0.0.4:22-10.0.0.1:57684.service: Deactivated successfully. Jul 11 00:47:08.567000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.4:22-10.0.0.1:57684 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 11 00:47:08.568839 systemd[1]: session-7.scope: Deactivated successfully. Jul 11 00:47:08.569431 systemd-logind[1205]: Session 7 logged out. Waiting for processes to exit. Jul 11 00:47:08.570183 systemd-logind[1205]: Removed session 7. Jul 11 00:47:08.977696 kubelet[1454]: I0711 00:47:08.977598 1454 transport.go:147] "Certificate rotation detected, shutting down client connections to start using new credentials" Jul 11 00:47:08.978405 kubelet[1454]: I0711 00:47:08.977745 1454 reflector.go:556] "Warning: watch ended with error" reflector="k8s.io/client-go/informers/factory.go:160" type="*v1.CSIDriver" err="very short watch: k8s.io/client-go/informers/factory.go:160: Unexpected watch close - watch lasted less than a second and no items received" Jul 11 00:47:08.978405 kubelet[1454]: I0711 00:47:08.977778 1454 reflector.go:556] "Warning: watch ended with error" reflector="k8s.io/client-go/informers/factory.go:160" type="*v1.Service" err="very short watch: k8s.io/client-go/informers/factory.go:160: Unexpected watch close - watch lasted less than a second and no items received" Jul 11 00:47:08.978405 kubelet[1454]: I0711 00:47:08.977803 1454 reflector.go:556] "Warning: watch ended with error" reflector="k8s.io/client-go/informers/factory.go:160" type="*v1.RuntimeClass" err="very short watch: k8s.io/client-go/informers/factory.go:160: Unexpected watch close - watch lasted less than a second and no items received" Jul 11 00:47:09.057032 kubelet[1454]: I0711 00:47:09.056986 1454 apiserver.go:52] "Watching apiserver" Jul 11 00:47:09.057032 kubelet[1454]: E0711 00:47:09.057023 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 11 00:47:09.063579 kubelet[1454]: E0711 00:47:09.063540 1454 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-nmdwm" podUID="52e0b70b-1770-423a-bbff-f30656e42551" Jul 11 00:47:09.069015 systemd[1]: Created slice kubepods-besteffort-pod67c0b141_c8bf_4328_aff4_325c47e1fa80.slice. Jul 11 00:47:09.070469 kubelet[1454]: I0711 00:47:09.070444 1454 desired_state_of_world_populator.go:158] "Finished populating initial desired state of world" Jul 11 00:47:09.072646 kubelet[1454]: I0711 00:47:09.072602 1454 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/67c0b141-c8bf-4328-aff4-325c47e1fa80-kube-proxy\") pod \"kube-proxy-r9hxq\" (UID: \"67c0b141-c8bf-4328-aff4-325c47e1fa80\") " pod="kube-system/kube-proxy-r9hxq" Jul 11 00:47:09.072646 kubelet[1454]: I0711 00:47:09.072630 1454 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/67c0b141-c8bf-4328-aff4-325c47e1fa80-xtables-lock\") pod \"kube-proxy-r9hxq\" (UID: \"67c0b141-c8bf-4328-aff4-325c47e1fa80\") " pod="kube-system/kube-proxy-r9hxq" Jul 11 00:47:09.072646 kubelet[1454]: I0711 00:47:09.072658 1454 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-4jc6x\" (UniqueName: \"kubernetes.io/projected/67c0b141-c8bf-4328-aff4-325c47e1fa80-kube-api-access-4jc6x\") pod \"kube-proxy-r9hxq\" (UID: \"67c0b141-c8bf-4328-aff4-325c47e1fa80\") " pod="kube-system/kube-proxy-r9hxq" Jul 11 00:47:09.072845 kubelet[1454]: I0711 00:47:09.072676 1454 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/bc8b71c2-6b21-4c61-98c1-f4235bf59580-cni-log-dir\") pod \"calico-node-6wh8d\" (UID: \"bc8b71c2-6b21-4c61-98c1-f4235bf59580\") " pod="calico-system/calico-node-6wh8d" Jul 11 00:47:09.072845 kubelet[1454]: I0711 00:47:09.072690 1454 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/bc8b71c2-6b21-4c61-98c1-f4235bf59580-cni-net-dir\") pod \"calico-node-6wh8d\" (UID: \"bc8b71c2-6b21-4c61-98c1-f4235bf59580\") " pod="calico-system/calico-node-6wh8d" Jul 11 00:47:09.072845 kubelet[1454]: I0711 00:47:09.072705 1454 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/bc8b71c2-6b21-4c61-98c1-f4235bf59580-var-run-calico\") pod \"calico-node-6wh8d\" (UID: \"bc8b71c2-6b21-4c61-98c1-f4235bf59580\") " pod="calico-system/calico-node-6wh8d" Jul 11 00:47:09.072845 kubelet[1454]: I0711 00:47:09.072729 1454 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/bc8b71c2-6b21-4c61-98c1-f4235bf59580-xtables-lock\") pod \"calico-node-6wh8d\" (UID: \"bc8b71c2-6b21-4c61-98c1-f4235bf59580\") " pod="calico-system/calico-node-6wh8d" Jul 11 00:47:09.072845 kubelet[1454]: I0711 00:47:09.072743 1454 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-gqg7x\" (UniqueName: \"kubernetes.io/projected/52e0b70b-1770-423a-bbff-f30656e42551-kube-api-access-gqg7x\") pod \"csi-node-driver-nmdwm\" (UID: \"52e0b70b-1770-423a-bbff-f30656e42551\") " pod="calico-system/csi-node-driver-nmdwm" Jul 11 00:47:09.073009 kubelet[1454]: I0711 00:47:09.072776 1454 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/bc8b71c2-6b21-4c61-98c1-f4235bf59580-cni-bin-dir\") pod \"calico-node-6wh8d\" (UID: \"bc8b71c2-6b21-4c61-98c1-f4235bf59580\") " pod="calico-system/calico-node-6wh8d" Jul 11 00:47:09.073009 kubelet[1454]: I0711 00:47:09.072804 1454 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/bc8b71c2-6b21-4c61-98c1-f4235bf59580-lib-modules\") pod \"calico-node-6wh8d\" (UID: \"bc8b71c2-6b21-4c61-98c1-f4235bf59580\") " pod="calico-system/calico-node-6wh8d" Jul 11 00:47:09.073009 kubelet[1454]: I0711 00:47:09.072823 1454 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/bc8b71c2-6b21-4c61-98c1-f4235bf59580-policysync\") pod \"calico-node-6wh8d\" (UID: \"bc8b71c2-6b21-4c61-98c1-f4235bf59580\") " pod="calico-system/calico-node-6wh8d" Jul 11 00:47:09.073009 kubelet[1454]: I0711 00:47:09.072840 1454 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-hhq7q\" (UniqueName: \"kubernetes.io/projected/bc8b71c2-6b21-4c61-98c1-f4235bf59580-kube-api-access-hhq7q\") pod \"calico-node-6wh8d\" (UID: \"bc8b71c2-6b21-4c61-98c1-f4235bf59580\") " pod="calico-system/calico-node-6wh8d" Jul 11 00:47:09.073009 kubelet[1454]: I0711 00:47:09.072860 1454 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/52e0b70b-1770-423a-bbff-f30656e42551-socket-dir\") pod \"csi-node-driver-nmdwm\" (UID: \"52e0b70b-1770-423a-bbff-f30656e42551\") " pod="calico-system/csi-node-driver-nmdwm" Jul 11 00:47:09.073244 kubelet[1454]: I0711 00:47:09.072875 1454 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/67c0b141-c8bf-4328-aff4-325c47e1fa80-lib-modules\") pod \"kube-proxy-r9hxq\" (UID: \"67c0b141-c8bf-4328-aff4-325c47e1fa80\") " pod="kube-system/kube-proxy-r9hxq" Jul 11 00:47:09.073244 kubelet[1454]: I0711 00:47:09.072888 1454 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/bc8b71c2-6b21-4c61-98c1-f4235bf59580-tigera-ca-bundle\") pod \"calico-node-6wh8d\" (UID: \"bc8b71c2-6b21-4c61-98c1-f4235bf59580\") " pod="calico-system/calico-node-6wh8d" Jul 11 00:47:09.073244 kubelet[1454]: I0711 00:47:09.072902 1454 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/bc8b71c2-6b21-4c61-98c1-f4235bf59580-var-lib-calico\") pod \"calico-node-6wh8d\" (UID: \"bc8b71c2-6b21-4c61-98c1-f4235bf59580\") " pod="calico-system/calico-node-6wh8d" Jul 11 00:47:09.073244 kubelet[1454]: I0711 00:47:09.072922 1454 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/52e0b70b-1770-423a-bbff-f30656e42551-kubelet-dir\") pod \"csi-node-driver-nmdwm\" (UID: \"52e0b70b-1770-423a-bbff-f30656e42551\") " pod="calico-system/csi-node-driver-nmdwm" Jul 11 00:47:09.073244 kubelet[1454]: I0711 00:47:09.072943 1454 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/52e0b70b-1770-423a-bbff-f30656e42551-varrun\") pod \"csi-node-driver-nmdwm\" (UID: \"52e0b70b-1770-423a-bbff-f30656e42551\") " pod="calico-system/csi-node-driver-nmdwm" Jul 11 00:47:09.073715 kubelet[1454]: I0711 00:47:09.072960 1454 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/bc8b71c2-6b21-4c61-98c1-f4235bf59580-flexvol-driver-host\") pod \"calico-node-6wh8d\" (UID: \"bc8b71c2-6b21-4c61-98c1-f4235bf59580\") " pod="calico-system/calico-node-6wh8d" Jul 11 00:47:09.073715 kubelet[1454]: I0711 00:47:09.072975 1454 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/bc8b71c2-6b21-4c61-98c1-f4235bf59580-node-certs\") pod \"calico-node-6wh8d\" (UID: \"bc8b71c2-6b21-4c61-98c1-f4235bf59580\") " pod="calico-system/calico-node-6wh8d" Jul 11 00:47:09.073715 kubelet[1454]: I0711 00:47:09.072992 1454 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/52e0b70b-1770-423a-bbff-f30656e42551-registration-dir\") pod \"csi-node-driver-nmdwm\" (UID: \"52e0b70b-1770-423a-bbff-f30656e42551\") " pod="calico-system/csi-node-driver-nmdwm" Jul 11 00:47:09.092498 systemd[1]: Created slice kubepods-besteffort-podbc8b71c2_6b21_4c61_98c1_f4235bf59580.slice. Jul 11 00:47:09.174606 kubelet[1454]: E0711 00:47:09.174571 1454 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 11 00:47:09.174606 kubelet[1454]: W0711 00:47:09.174592 1454 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 11 00:47:09.174606 kubelet[1454]: E0711 00:47:09.174608 1454 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 11 00:47:09.174828 kubelet[1454]: I0711 00:47:09.174801 1454 swap_util.go:74] "error creating dir to test if tmpfs noswap is enabled. Assuming not supported" mount path="" error="stat /var/lib/kubelet/plugins/kubernetes.io/empty-dir: no such file or directory" Jul 11 00:47:09.174977 kubelet[1454]: E0711 00:47:09.174813 1454 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 11 00:47:09.174977 kubelet[1454]: W0711 00:47:09.174969 1454 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 11 00:47:09.174977 kubelet[1454]: E0711 00:47:09.174979 1454 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 11 00:47:09.175198 kubelet[1454]: E0711 00:47:09.175173 1454 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 11 00:47:09.175198 kubelet[1454]: W0711 00:47:09.175187 1454 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 11 00:47:09.175198 kubelet[1454]: E0711 00:47:09.175196 1454 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 11 00:47:09.175374 kubelet[1454]: E0711 00:47:09.175351 1454 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 11 00:47:09.175374 kubelet[1454]: W0711 00:47:09.175363 1454 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 11 00:47:09.175374 kubelet[1454]: E0711 00:47:09.175371 1454 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 11 00:47:09.175527 kubelet[1454]: E0711 00:47:09.175515 1454 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 11 00:47:09.175527 kubelet[1454]: W0711 00:47:09.175526 1454 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 11 00:47:09.175580 kubelet[1454]: E0711 00:47:09.175535 1454 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 11 00:47:09.175686 kubelet[1454]: E0711 00:47:09.175674 1454 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 11 00:47:09.175686 kubelet[1454]: W0711 00:47:09.175685 1454 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 11 00:47:09.175742 kubelet[1454]: E0711 00:47:09.175693 1454 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 11 00:47:09.175869 kubelet[1454]: E0711 00:47:09.175858 1454 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 11 00:47:09.175869 kubelet[1454]: W0711 00:47:09.175869 1454 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 11 00:47:09.175930 kubelet[1454]: E0711 00:47:09.175878 1454 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 11 00:47:09.176046 kubelet[1454]: E0711 00:47:09.176034 1454 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 11 00:47:09.176075 kubelet[1454]: W0711 00:47:09.176046 1454 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 11 00:47:09.176075 kubelet[1454]: E0711 00:47:09.176054 1454 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 11 00:47:09.176240 kubelet[1454]: E0711 00:47:09.176229 1454 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 11 00:47:09.176269 kubelet[1454]: W0711 00:47:09.176242 1454 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 11 00:47:09.176269 kubelet[1454]: E0711 00:47:09.176251 1454 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 11 00:47:09.179685 kubelet[1454]: E0711 00:47:09.179612 1454 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 11 00:47:09.179685 kubelet[1454]: W0711 00:47:09.179627 1454 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 11 00:47:09.179685 kubelet[1454]: E0711 00:47:09.179639 1454 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 11 00:47:09.185483 kubelet[1454]: E0711 00:47:09.185454 1454 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 11 00:47:09.185483 kubelet[1454]: W0711 00:47:09.185473 1454 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 11 00:47:09.185483 kubelet[1454]: E0711 00:47:09.185488 1454 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 11 00:47:09.186005 kubelet[1454]: E0711 00:47:09.185991 1454 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 11 00:47:09.186082 kubelet[1454]: W0711 00:47:09.186069 1454 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 11 00:47:09.186162 kubelet[1454]: E0711 00:47:09.186144 1454 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 11 00:47:09.186618 kubelet[1454]: E0711 00:47:09.186604 1454 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 11 00:47:09.186694 kubelet[1454]: W0711 00:47:09.186682 1454 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 11 00:47:09.186758 kubelet[1454]: E0711 00:47:09.186747 1454 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 11 00:47:09.391817 kubelet[1454]: E0711 00:47:09.391793 1454 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Jul 11 00:47:09.392587 env[1214]: time="2025-07-11T00:47:09.392532498Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-r9hxq,Uid:67c0b141-c8bf-4328-aff4-325c47e1fa80,Namespace:kube-system,Attempt:0,}" Jul 11 00:47:09.394509 env[1214]: time="2025-07-11T00:47:09.394462432Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-6wh8d,Uid:bc8b71c2-6b21-4c61-98c1-f4235bf59580,Namespace:calico-system,Attempt:0,}" Jul 11 00:47:09.933683 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount974864093.mount: Deactivated successfully. Jul 11 00:47:09.939247 env[1214]: time="2025-07-11T00:47:09.939209699Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 11 00:47:09.940597 env[1214]: time="2025-07-11T00:47:09.940524902Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 11 00:47:09.942523 env[1214]: time="2025-07-11T00:47:09.942493177Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7d46a07936af93fcce097459055f93ab07331509aa55f4a2a90d95a3ace1850e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 11 00:47:09.944090 env[1214]: time="2025-07-11T00:47:09.944059366Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:7d46a07936af93fcce097459055f93ab07331509aa55f4a2a90d95a3ace1850e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 11 00:47:09.945659 env[1214]: time="2025-07-11T00:47:09.945634892Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 11 00:47:09.946414 env[1214]: time="2025-07-11T00:47:09.946389717Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 11 00:47:09.948383 env[1214]: time="2025-07-11T00:47:09.948351953Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 11 00:47:09.949485 env[1214]: time="2025-07-11T00:47:09.949445651Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 11 00:47:09.979992 env[1214]: time="2025-07-11T00:47:09.979916108Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 11 00:47:09.979992 env[1214]: time="2025-07-11T00:47:09.979955919Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 11 00:47:09.979992 env[1214]: time="2025-07-11T00:47:09.979966568Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 11 00:47:09.980263 env[1214]: time="2025-07-11T00:47:09.980202217Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/78e0eca540a547ac805529b6f295a730da41f21660a1df960c0cc8b4b54780ce pid=1536 runtime=io.containerd.runc.v2 Jul 11 00:47:09.980879 env[1214]: time="2025-07-11T00:47:09.980719605Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 11 00:47:09.980879 env[1214]: time="2025-07-11T00:47:09.980747219Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 11 00:47:09.980879 env[1214]: time="2025-07-11T00:47:09.980756794Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 11 00:47:09.980976 env[1214]: time="2025-07-11T00:47:09.980899908Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/d6039df74250890e14f8db8e467a5be4c017c0f8d8b683f9f4ee4918a6c842ed pid=1537 runtime=io.containerd.runc.v2 Jul 11 00:47:09.995701 systemd[1]: Started cri-containerd-d6039df74250890e14f8db8e467a5be4c017c0f8d8b683f9f4ee4918a6c842ed.scope. Jul 11 00:47:09.997962 systemd[1]: Started cri-containerd-78e0eca540a547ac805529b6f295a730da41f21660a1df960c0cc8b4b54780ce.scope. Jul 11 00:47:10.022000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:10.022000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:10.022000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:10.022000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:10.022000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:10.022000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:10.022000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:10.022000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:10.022000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:10.023000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:10.023000 audit: BPF prog-id=55 op=LOAD Jul 11 00:47:10.023000 audit[1555]: AVC avc: denied { bpf } for pid=1555 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:10.023000 audit[1555]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=400014db38 a2=10 a3=0 items=0 ppid=1537 pid=1555 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 11 00:47:10.023000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6436303339646637343235303839306531346638646238653436376135 Jul 11 00:47:10.023000 audit[1555]: AVC avc: denied { perfmon } for pid=1555 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:10.023000 audit[1555]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=400014d5a0 a2=3c a3=0 items=0 ppid=1537 pid=1555 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 11 00:47:10.023000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6436303339646637343235303839306531346638646238653436376135 Jul 11 00:47:10.023000 audit[1555]: AVC avc: denied { bpf } for pid=1555 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:10.023000 audit[1555]: AVC avc: denied { bpf } for pid=1555 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:10.023000 audit[1555]: AVC avc: denied { bpf } for pid=1555 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:10.023000 audit[1555]: AVC avc: denied { perfmon } for pid=1555 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:10.023000 audit[1555]: AVC avc: denied { perfmon } for pid=1555 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:10.023000 audit[1555]: AVC avc: denied { perfmon } for pid=1555 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:10.023000 audit[1555]: AVC avc: denied { perfmon } for pid=1555 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:10.023000 audit[1555]: AVC avc: denied { perfmon } for pid=1555 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:10.023000 audit[1555]: AVC avc: denied { bpf } for pid=1555 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:10.023000 audit[1555]: AVC avc: denied { bpf } for pid=1555 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:10.023000 audit: BPF prog-id=56 op=LOAD Jul 11 00:47:10.023000 audit[1555]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400014d8e0 a2=78 a3=0 items=0 ppid=1537 pid=1555 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 11 00:47:10.023000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6436303339646637343235303839306531346638646238653436376135 Jul 11 00:47:10.023000 audit[1555]: AVC avc: denied { bpf } for pid=1555 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:10.023000 audit[1555]: AVC avc: denied { bpf } for pid=1555 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:10.023000 audit[1555]: AVC avc: denied { perfmon } for pid=1555 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:10.023000 audit[1555]: AVC avc: denied { perfmon } for pid=1555 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:10.023000 audit[1555]: AVC avc: denied { perfmon } for pid=1555 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:10.023000 audit[1555]: AVC avc: denied { perfmon } for pid=1555 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:10.023000 audit[1555]: AVC avc: denied { perfmon } for pid=1555 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:10.023000 audit[1555]: AVC avc: denied { bpf } for pid=1555 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:10.023000 audit[1555]: AVC avc: denied { bpf } for pid=1555 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:10.023000 audit: BPF prog-id=57 op=LOAD Jul 11 00:47:10.023000 audit[1555]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=400014d670 a2=78 a3=0 items=0 ppid=1537 pid=1555 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 11 00:47:10.023000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6436303339646637343235303839306531346638646238653436376135 Jul 11 00:47:10.023000 audit: BPF prog-id=57 op=UNLOAD Jul 11 00:47:10.023000 audit: BPF prog-id=56 op=UNLOAD Jul 11 00:47:10.023000 audit[1555]: AVC avc: denied { bpf } for pid=1555 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:10.023000 audit[1555]: AVC avc: denied { bpf } for pid=1555 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:10.023000 audit[1555]: AVC avc: denied { bpf } for pid=1555 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:10.023000 audit[1555]: AVC avc: denied { perfmon } for pid=1555 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:10.023000 audit[1555]: AVC avc: denied { perfmon } for pid=1555 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:10.023000 audit[1555]: AVC avc: denied { perfmon } for pid=1555 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:10.023000 audit[1555]: AVC avc: denied { perfmon } for pid=1555 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:10.023000 audit[1555]: AVC avc: denied { perfmon } for pid=1555 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:10.023000 audit[1555]: AVC avc: denied { bpf } for pid=1555 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:10.023000 audit[1555]: AVC avc: denied { bpf } for pid=1555 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:10.023000 audit: BPF prog-id=58 op=LOAD Jul 11 00:47:10.023000 audit[1555]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400014db40 a2=78 a3=0 items=0 ppid=1537 pid=1555 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 11 00:47:10.023000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6436303339646637343235303839306531346638646238653436376135 Jul 11 00:47:10.028000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:10.028000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:10.028000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:10.028000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:10.028000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:10.028000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:10.028000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:10.028000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:10.028000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:10.028000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:10.028000 audit: BPF prog-id=59 op=LOAD Jul 11 00:47:10.029000 audit[1554]: AVC avc: denied { bpf } for pid=1554 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:10.029000 audit[1554]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000197b38 a2=10 a3=0 items=0 ppid=1536 pid=1554 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 11 00:47:10.029000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3738653065636135343061353437616338303535323962366632393561 Jul 11 00:47:10.033000 audit[1554]: AVC avc: denied { perfmon } for pid=1554 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:10.033000 audit[1554]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001975a0 a2=3c a3=0 items=0 ppid=1536 pid=1554 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 11 00:47:10.033000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3738653065636135343061353437616338303535323962366632393561 Jul 11 00:47:10.033000 audit[1554]: AVC avc: denied { bpf } for pid=1554 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:10.033000 audit[1554]: AVC avc: denied { bpf } for pid=1554 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:10.033000 audit[1554]: AVC avc: denied { bpf } for pid=1554 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:10.033000 audit[1554]: AVC avc: denied { perfmon } for pid=1554 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:10.033000 audit[1554]: AVC avc: denied { perfmon } for pid=1554 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:10.033000 audit[1554]: AVC avc: denied { perfmon } for pid=1554 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:10.033000 audit[1554]: AVC avc: denied { perfmon } for pid=1554 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:10.033000 audit[1554]: AVC avc: denied { perfmon } for pid=1554 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:10.033000 audit[1554]: AVC avc: denied { bpf } for pid=1554 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:10.033000 audit[1554]: AVC avc: denied { bpf } for pid=1554 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:10.033000 audit: BPF prog-id=60 op=LOAD Jul 11 00:47:10.033000 audit[1554]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001978e0 a2=78 a3=0 items=0 ppid=1536 pid=1554 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 11 00:47:10.033000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3738653065636135343061353437616338303535323962366632393561 Jul 11 00:47:10.033000 audit[1554]: AVC avc: denied { bpf } for pid=1554 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:10.033000 audit[1554]: AVC avc: denied { bpf } for pid=1554 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:10.033000 audit[1554]: AVC avc: denied { perfmon } for pid=1554 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:10.033000 audit[1554]: AVC avc: denied { perfmon } for pid=1554 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:10.033000 audit[1554]: AVC avc: denied { perfmon } for pid=1554 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:10.033000 audit[1554]: AVC avc: denied { perfmon } for pid=1554 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:10.033000 audit[1554]: AVC avc: denied { perfmon } for pid=1554 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:10.033000 audit[1554]: AVC avc: denied { bpf } for pid=1554 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:10.033000 audit[1554]: AVC avc: denied { bpf } for pid=1554 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:10.033000 audit: BPF prog-id=61 op=LOAD Jul 11 00:47:10.033000 audit[1554]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000197670 a2=78 a3=0 items=0 ppid=1536 pid=1554 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 11 00:47:10.033000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3738653065636135343061353437616338303535323962366632393561 Jul 11 00:47:10.033000 audit: BPF prog-id=61 op=UNLOAD Jul 11 00:47:10.033000 audit: BPF prog-id=60 op=UNLOAD Jul 11 00:47:10.033000 audit[1554]: AVC avc: denied { bpf } for pid=1554 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:10.033000 audit[1554]: AVC avc: denied { bpf } for pid=1554 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:10.033000 audit[1554]: AVC avc: denied { bpf } for pid=1554 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:10.033000 audit[1554]: AVC avc: denied { perfmon } for pid=1554 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:10.033000 audit[1554]: AVC avc: denied { perfmon } for pid=1554 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:10.033000 audit[1554]: AVC avc: denied { perfmon } for pid=1554 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:10.033000 audit[1554]: AVC avc: denied { perfmon } for pid=1554 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:10.033000 audit[1554]: AVC avc: denied { perfmon } for pid=1554 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:10.033000 audit[1554]: AVC avc: denied { bpf } for pid=1554 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:10.033000 audit[1554]: AVC avc: denied { bpf } for pid=1554 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:10.033000 audit: BPF prog-id=62 op=LOAD Jul 11 00:47:10.033000 audit[1554]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000197b40 a2=78 a3=0 items=0 ppid=1536 pid=1554 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 11 00:47:10.033000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3738653065636135343061353437616338303535323962366632393561 Jul 11 00:47:10.041005 env[1214]: time="2025-07-11T00:47:10.039067173Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-r9hxq,Uid:67c0b141-c8bf-4328-aff4-325c47e1fa80,Namespace:kube-system,Attempt:0,} returns sandbox id \"d6039df74250890e14f8db8e467a5be4c017c0f8d8b683f9f4ee4918a6c842ed\"" Jul 11 00:47:10.041096 kubelet[1454]: E0711 00:47:10.040266 1454 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Jul 11 00:47:10.041588 env[1214]: time="2025-07-11T00:47:10.041542208Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.33.2\"" Jul 11 00:47:10.049392 env[1214]: time="2025-07-11T00:47:10.049095874Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-6wh8d,Uid:bc8b71c2-6b21-4c61-98c1-f4235bf59580,Namespace:calico-system,Attempt:0,} returns sandbox id \"78e0eca540a547ac805529b6f295a730da41f21660a1df960c0cc8b4b54780ce\"" Jul 11 00:47:10.057748 kubelet[1454]: E0711 00:47:10.057707 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 11 00:47:10.253843 kubelet[1454]: E0711 00:47:10.251641 1454 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-nmdwm" podUID="52e0b70b-1770-423a-bbff-f30656e42551" Jul 11 00:47:11.058716 kubelet[1454]: E0711 00:47:11.058668 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 11 00:47:11.119527 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1172073404.mount: Deactivated successfully. Jul 11 00:47:11.601445 env[1214]: time="2025-07-11T00:47:11.601399236Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.33.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 11 00:47:11.603756 env[1214]: time="2025-07-11T00:47:11.603723285Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:c26522e54bad2e6bfbb1bf11500833c94433076a3fa38436a2ec496a422c5455,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 11 00:47:11.607275 env[1214]: time="2025-07-11T00:47:11.607242568Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.33.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 11 00:47:11.607857 env[1214]: time="2025-07-11T00:47:11.607824485Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.33.2\" returns image reference \"sha256:c26522e54bad2e6bfbb1bf11500833c94433076a3fa38436a2ec496a422c5455\"" Jul 11 00:47:11.608342 env[1214]: time="2025-07-11T00:47:11.608311692Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:4796ef3e43efa5ed2a5b015c18f81d3c2fe3aea36f555ea643cc01827eb65e51,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 11 00:47:11.609933 env[1214]: time="2025-07-11T00:47:11.609890068Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.2\"" Jul 11 00:47:11.612225 env[1214]: time="2025-07-11T00:47:11.612192588Z" level=info msg="CreateContainer within sandbox \"d6039df74250890e14f8db8e467a5be4c017c0f8d8b683f9f4ee4918a6c842ed\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Jul 11 00:47:11.624668 env[1214]: time="2025-07-11T00:47:11.624627073Z" level=info msg="CreateContainer within sandbox \"d6039df74250890e14f8db8e467a5be4c017c0f8d8b683f9f4ee4918a6c842ed\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"983557e238777813747075c0c4166645cc9f6ec1e89f6a450f6687be75054afb\"" Jul 11 00:47:11.625367 env[1214]: time="2025-07-11T00:47:11.625312297Z" level=info msg="StartContainer for \"983557e238777813747075c0c4166645cc9f6ec1e89f6a450f6687be75054afb\"" Jul 11 00:47:11.641651 systemd[1]: Started cri-containerd-983557e238777813747075c0c4166645cc9f6ec1e89f6a450f6687be75054afb.scope. Jul 11 00:47:11.667000 audit[1611]: AVC avc: denied { perfmon } for pid=1611 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:11.669212 kernel: kauditd_printk_skb: 357 callbacks suppressed Jul 11 00:47:11.669275 kernel: audit: type=1400 audit(1752194831.667:456): avc: denied { perfmon } for pid=1611 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:11.667000 audit[1611]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=1537 pid=1611 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 11 00:47:11.675111 kernel: audit: type=1300 audit(1752194831.667:456): arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=1537 pid=1611 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 11 00:47:11.675164 kernel: audit: type=1327 audit(1752194831.667:456): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3938333535376532333837373738313337343730373563306334313636 Jul 11 00:47:11.667000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3938333535376532333837373738313337343730373563306334313636 Jul 11 00:47:11.667000 audit[1611]: AVC avc: denied { bpf } for pid=1611 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:11.680617 kernel: audit: type=1400 audit(1752194831.667:457): avc: denied { bpf } for pid=1611 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:11.680669 kernel: audit: type=1400 audit(1752194831.667:457): avc: denied { bpf } for pid=1611 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:11.667000 audit[1611]: AVC avc: denied { bpf } for pid=1611 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:11.667000 audit[1611]: AVC avc: denied { bpf } for pid=1611 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:11.685415 kernel: audit: type=1400 audit(1752194831.667:457): avc: denied { bpf } for pid=1611 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:11.667000 audit[1611]: AVC avc: denied { perfmon } for pid=1611 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:11.687985 kernel: audit: type=1400 audit(1752194831.667:457): avc: denied { perfmon } for pid=1611 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:11.667000 audit[1611]: AVC avc: denied { perfmon } for pid=1611 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:11.690521 kernel: audit: type=1400 audit(1752194831.667:457): avc: denied { perfmon } for pid=1611 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:11.667000 audit[1611]: AVC avc: denied { perfmon } for pid=1611 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:11.693115 kernel: audit: type=1400 audit(1752194831.667:457): avc: denied { perfmon } for pid=1611 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:11.693184 kernel: audit: type=1400 audit(1752194831.667:457): avc: denied { perfmon } for pid=1611 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:11.667000 audit[1611]: AVC avc: denied { perfmon } for pid=1611 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:11.667000 audit[1611]: AVC avc: denied { perfmon } for pid=1611 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:11.667000 audit[1611]: AVC avc: denied { bpf } for pid=1611 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:11.667000 audit[1611]: AVC avc: denied { bpf } for pid=1611 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:11.667000 audit: BPF prog-id=63 op=LOAD Jul 11 00:47:11.667000 audit[1611]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=1537 pid=1611 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 11 00:47:11.667000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3938333535376532333837373738313337343730373563306334313636 Jul 11 00:47:11.668000 audit[1611]: AVC avc: denied { bpf } for pid=1611 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:11.668000 audit[1611]: AVC avc: denied { bpf } for pid=1611 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:11.668000 audit[1611]: AVC avc: denied { perfmon } for pid=1611 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:11.668000 audit[1611]: AVC avc: denied { perfmon } for pid=1611 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:11.668000 audit[1611]: AVC avc: denied { perfmon } for pid=1611 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:11.668000 audit[1611]: AVC avc: denied { perfmon } for pid=1611 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:11.668000 audit[1611]: AVC avc: denied { perfmon } for pid=1611 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:11.668000 audit[1611]: AVC avc: denied { bpf } for pid=1611 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:11.668000 audit[1611]: AVC avc: denied { bpf } for pid=1611 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:11.668000 audit: BPF prog-id=64 op=LOAD Jul 11 00:47:11.668000 audit[1611]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=1537 pid=1611 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 11 00:47:11.668000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3938333535376532333837373738313337343730373563306334313636 Jul 11 00:47:11.670000 audit: BPF prog-id=64 op=UNLOAD Jul 11 00:47:11.670000 audit: BPF prog-id=63 op=UNLOAD Jul 11 00:47:11.670000 audit[1611]: AVC avc: denied { bpf } for pid=1611 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:11.670000 audit[1611]: AVC avc: denied { bpf } for pid=1611 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:11.670000 audit[1611]: AVC avc: denied { bpf } for pid=1611 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:11.670000 audit[1611]: AVC avc: denied { perfmon } for pid=1611 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:11.670000 audit[1611]: AVC avc: denied { perfmon } for pid=1611 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:11.670000 audit[1611]: AVC avc: denied { perfmon } for pid=1611 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:11.670000 audit[1611]: AVC avc: denied { perfmon } for pid=1611 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:11.670000 audit[1611]: AVC avc: denied { perfmon } for pid=1611 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:11.670000 audit[1611]: AVC avc: denied { bpf } for pid=1611 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:11.670000 audit[1611]: AVC avc: denied { bpf } for pid=1611 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:11.670000 audit: BPF prog-id=65 op=LOAD Jul 11 00:47:11.670000 audit[1611]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=1537 pid=1611 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 11 00:47:11.670000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3938333535376532333837373738313337343730373563306334313636 Jul 11 00:47:11.698439 env[1214]: time="2025-07-11T00:47:11.698403306Z" level=info msg="StartContainer for \"983557e238777813747075c0c4166645cc9f6ec1e89f6a450f6687be75054afb\" returns successfully" Jul 11 00:47:11.873000 audit[1673]: NETFILTER_CFG table=mangle:14 family=2 entries=1 op=nft_register_chain pid=1673 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 11 00:47:11.873000 audit[1673]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffcfabac20 a2=0 a3=1 items=0 ppid=1622 pid=1673 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 11 00:47:11.873000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Jul 11 00:47:11.874000 audit[1675]: NETFILTER_CFG table=mangle:15 family=10 entries=1 op=nft_register_chain pid=1675 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 11 00:47:11.874000 audit[1675]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffd3131530 a2=0 a3=1 items=0 ppid=1622 pid=1675 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 11 00:47:11.874000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Jul 11 00:47:11.874000 audit[1677]: NETFILTER_CFG table=nat:16 family=2 entries=1 op=nft_register_chain pid=1677 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 11 00:47:11.874000 audit[1677]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffd7e3ad30 a2=0 a3=1 items=0 ppid=1622 pid=1677 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 11 00:47:11.874000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Jul 11 00:47:11.875000 audit[1678]: NETFILTER_CFG table=filter:17 family=2 entries=1 op=nft_register_chain pid=1678 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 11 00:47:11.875000 audit[1678]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffdc08bef0 a2=0 a3=1 items=0 ppid=1622 pid=1678 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 11 00:47:11.875000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Jul 11 00:47:11.875000 audit[1679]: NETFILTER_CFG table=nat:18 family=10 entries=1 op=nft_register_chain pid=1679 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 11 00:47:11.875000 audit[1679]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffee8473d0 a2=0 a3=1 items=0 ppid=1622 pid=1679 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 11 00:47:11.875000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Jul 11 00:47:11.877000 audit[1681]: NETFILTER_CFG table=filter:19 family=10 entries=1 op=nft_register_chain pid=1681 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 11 00:47:11.877000 audit[1681]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffdf18cab0 a2=0 a3=1 items=0 ppid=1622 pid=1681 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 11 00:47:11.877000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Jul 11 00:47:11.977000 audit[1682]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_chain pid=1682 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 11 00:47:11.977000 audit[1682]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=108 a0=3 a1=ffffe7c096c0 a2=0 a3=1 items=0 ppid=1622 pid=1682 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 11 00:47:11.977000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Jul 11 00:47:11.981000 audit[1684]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=1684 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 11 00:47:11.981000 audit[1684]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=752 a0=3 a1=ffffcb965420 a2=0 a3=1 items=0 ppid=1622 pid=1684 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 11 00:47:11.981000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Jul 11 00:47:11.984000 audit[1687]: NETFILTER_CFG table=filter:22 family=2 entries=2 op=nft_register_chain pid=1687 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 11 00:47:11.984000 audit[1687]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=836 a0=3 a1=ffffcba6d990 a2=0 a3=1 items=0 ppid=1622 pid=1687 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 11 00:47:11.984000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Jul 11 00:47:11.986000 audit[1688]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_chain pid=1688 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 11 00:47:11.986000 audit[1688]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffce814c20 a2=0 a3=1 items=0 ppid=1622 pid=1688 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 11 00:47:11.986000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Jul 11 00:47:11.988000 audit[1690]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_register_rule pid=1690 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 11 00:47:11.988000 audit[1690]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffcc6762a0 a2=0 a3=1 items=0 ppid=1622 pid=1690 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 11 00:47:11.988000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Jul 11 00:47:11.989000 audit[1691]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_chain pid=1691 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 11 00:47:11.989000 audit[1691]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffe7529e10 a2=0 a3=1 items=0 ppid=1622 pid=1691 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 11 00:47:11.989000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Jul 11 00:47:11.991000 audit[1693]: NETFILTER_CFG table=filter:26 family=2 entries=1 op=nft_register_rule pid=1693 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 11 00:47:11.991000 audit[1693]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=fffff33e7860 a2=0 a3=1 items=0 ppid=1622 pid=1693 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 11 00:47:11.991000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Jul 11 00:47:11.994000 audit[1696]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_rule pid=1696 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 11 00:47:11.994000 audit[1696]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=ffffe2b18030 a2=0 a3=1 items=0 ppid=1622 pid=1696 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 11 00:47:11.994000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 Jul 11 00:47:11.995000 audit[1697]: NETFILTER_CFG table=filter:28 family=2 entries=1 op=nft_register_chain pid=1697 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 11 00:47:11.995000 audit[1697]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffff5fcbe60 a2=0 a3=1 items=0 ppid=1622 pid=1697 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 11 00:47:11.995000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Jul 11 00:47:11.997000 audit[1699]: NETFILTER_CFG table=filter:29 family=2 entries=1 op=nft_register_rule pid=1699 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 11 00:47:11.997000 audit[1699]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffc09fba00 a2=0 a3=1 items=0 ppid=1622 pid=1699 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 11 00:47:11.997000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Jul 11 00:47:11.998000 audit[1700]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_chain pid=1700 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 11 00:47:11.998000 audit[1700]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=fffff77a71a0 a2=0 a3=1 items=0 ppid=1622 pid=1700 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 11 00:47:11.998000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Jul 11 00:47:12.000000 audit[1702]: NETFILTER_CFG table=filter:31 family=2 entries=1 op=nft_register_rule pid=1702 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 11 00:47:12.000000 audit[1702]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=fffff6421950 a2=0 a3=1 items=0 ppid=1622 pid=1702 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 11 00:47:12.000000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Jul 11 00:47:12.004000 audit[1705]: NETFILTER_CFG table=filter:32 family=2 entries=1 op=nft_register_rule pid=1705 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 11 00:47:12.004000 audit[1705]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffe2fd84f0 a2=0 a3=1 items=0 ppid=1622 pid=1705 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 11 00:47:12.004000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Jul 11 00:47:12.008000 audit[1708]: NETFILTER_CFG table=filter:33 family=2 entries=1 op=nft_register_rule pid=1708 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 11 00:47:12.008000 audit[1708]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffe4238010 a2=0 a3=1 items=0 ppid=1622 pid=1708 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 11 00:47:12.008000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Jul 11 00:47:12.009000 audit[1709]: NETFILTER_CFG table=nat:34 family=2 entries=1 op=nft_register_chain pid=1709 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 11 00:47:12.009000 audit[1709]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=ffffcba3ff50 a2=0 a3=1 items=0 ppid=1622 pid=1709 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 11 00:47:12.009000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Jul 11 00:47:12.012000 audit[1711]: NETFILTER_CFG table=nat:35 family=2 entries=2 op=nft_register_chain pid=1711 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 11 00:47:12.012000 audit[1711]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=600 a0=3 a1=fffff89ffdd0 a2=0 a3=1 items=0 ppid=1622 pid=1711 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 11 00:47:12.012000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Jul 11 00:47:12.043000 audit[1715]: NETFILTER_CFG table=nat:36 family=2 entries=2 op=nft_register_chain pid=1715 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 11 00:47:12.043000 audit[1715]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=608 a0=3 a1=ffffc7015110 a2=0 a3=1 items=0 ppid=1622 pid=1715 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 11 00:47:12.043000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Jul 11 00:47:12.044000 audit[1716]: NETFILTER_CFG table=nat:37 family=2 entries=1 op=nft_register_chain pid=1716 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 11 00:47:12.044000 audit[1716]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffcdcaa430 a2=0 a3=1 items=0 ppid=1622 pid=1716 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 11 00:47:12.044000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Jul 11 00:47:12.047000 audit[1718]: NETFILTER_CFG table=nat:38 family=2 entries=2 op=nft_register_chain pid=1718 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 11 00:47:12.047000 audit[1718]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=612 a0=3 a1=ffffe1cae460 a2=0 a3=1 items=0 ppid=1622 pid=1718 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 11 00:47:12.047000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Jul 11 00:47:12.058787 kubelet[1454]: E0711 00:47:12.058749 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 11 00:47:12.071000 audit[1724]: NETFILTER_CFG table=filter:39 family=2 entries=10 op=nft_register_rule pid=1724 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 11 00:47:12.071000 audit[1724]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6736 a0=3 a1=ffffd4bc7710 a2=0 a3=1 items=0 ppid=1622 pid=1724 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 11 00:47:12.071000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 11 00:47:12.097000 audit[1724]: NETFILTER_CFG table=nat:40 family=2 entries=28 op=nft_register_chain pid=1724 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 11 00:47:12.097000 audit[1724]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=12660 a0=3 a1=ffffd4bc7710 a2=0 a3=1 items=0 ppid=1622 pid=1724 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 11 00:47:12.097000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 11 00:47:12.099000 audit[1731]: NETFILTER_CFG table=filter:41 family=10 entries=1 op=nft_register_chain pid=1731 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 11 00:47:12.099000 audit[1731]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=108 a0=3 a1=fffff8f532e0 a2=0 a3=1 items=0 ppid=1622 pid=1731 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 11 00:47:12.099000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Jul 11 00:47:12.101000 audit[1735]: NETFILTER_CFG table=filter:42 family=10 entries=2 op=nft_register_chain pid=1735 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 11 00:47:12.101000 audit[1735]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=836 a0=3 a1=ffffd87a4b40 a2=0 a3=1 items=0 ppid=1622 pid=1735 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 11 00:47:12.101000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 Jul 11 00:47:12.102000 audit[1734]: NETFILTER_CFG table=filter:43 family=2 entries=15 op=nft_register_rule pid=1734 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 11 00:47:12.102000 audit[1734]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=4504 a0=3 a1=ffffe980d380 a2=0 a3=1 items=0 ppid=1622 pid=1734 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 11 00:47:12.102000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 11 00:47:12.123000 audit[1734]: NETFILTER_CFG table=nat:44 family=2 entries=37 op=nft_register_chain pid=1734 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 11 00:47:12.123000 audit[1734]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=14964 a0=3 a1=ffffe980d380 a2=0 a3=1 items=0 ppid=1622 pid=1734 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 11 00:47:12.123000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 11 00:47:12.133000 audit[1738]: NETFILTER_CFG table=filter:45 family=10 entries=2 op=nft_register_chain pid=1738 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 11 00:47:12.133000 audit[1738]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=836 a0=3 a1=ffffd5a43180 a2=0 a3=1 items=0 ppid=1622 pid=1738 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 11 00:47:12.133000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 Jul 11 00:47:12.136000 audit[1740]: NETFILTER_CFG table=filter:46 family=10 entries=1 op=nft_register_chain pid=1740 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 11 00:47:12.136000 audit[1740]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffe198b010 a2=0 a3=1 items=0 ppid=1622 pid=1740 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 11 00:47:12.136000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Jul 11 00:47:12.138000 audit[1742]: NETFILTER_CFG table=filter:47 family=10 entries=1 op=nft_register_rule pid=1742 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 11 00:47:12.138000 audit[1742]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffed712890 a2=0 a3=1 items=0 ppid=1622 pid=1742 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 11 00:47:12.138000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Jul 11 00:47:12.139000 audit[1743]: NETFILTER_CFG table=filter:48 family=10 entries=1 op=nft_register_chain pid=1743 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 11 00:47:12.139000 audit[1743]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffee52ff20 a2=0 a3=1 items=0 ppid=1622 pid=1743 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 11 00:47:12.139000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Jul 11 00:47:12.141000 audit[1745]: NETFILTER_CFG table=filter:49 family=10 entries=1 op=nft_register_rule pid=1745 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 11 00:47:12.141000 audit[1745]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=ffffd1f7e6c0 a2=0 a3=1 items=0 ppid=1622 pid=1745 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 11 00:47:12.141000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 Jul 11 00:47:12.144000 audit[1748]: NETFILTER_CFG table=filter:50 family=10 entries=2 op=nft_register_chain pid=1748 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 11 00:47:12.144000 audit[1748]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=828 a0=3 a1=ffffe440b120 a2=0 a3=1 items=0 ppid=1622 pid=1748 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 11 00:47:12.144000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Jul 11 00:47:12.145000 audit[1749]: NETFILTER_CFG table=filter:51 family=10 entries=1 op=nft_register_chain pid=1749 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 11 00:47:12.145000 audit[1749]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffd5146b40 a2=0 a3=1 items=0 ppid=1622 pid=1749 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 11 00:47:12.145000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Jul 11 00:47:12.147000 audit[1751]: NETFILTER_CFG table=filter:52 family=10 entries=1 op=nft_register_rule pid=1751 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 11 00:47:12.147000 audit[1751]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=fffffe8f6ea0 a2=0 a3=1 items=0 ppid=1622 pid=1751 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 11 00:47:12.147000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Jul 11 00:47:12.148000 audit[1752]: NETFILTER_CFG table=filter:53 family=10 entries=1 op=nft_register_chain pid=1752 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 11 00:47:12.148000 audit[1752]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffc7430470 a2=0 a3=1 items=0 ppid=1622 pid=1752 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 11 00:47:12.148000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Jul 11 00:47:12.150000 audit[1754]: NETFILTER_CFG table=filter:54 family=10 entries=1 op=nft_register_rule pid=1754 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 11 00:47:12.150000 audit[1754]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffc3422b30 a2=0 a3=1 items=0 ppid=1622 pid=1754 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 11 00:47:12.150000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Jul 11 00:47:12.153000 audit[1757]: NETFILTER_CFG table=filter:55 family=10 entries=1 op=nft_register_rule pid=1757 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 11 00:47:12.153000 audit[1757]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffc8a97dc0 a2=0 a3=1 items=0 ppid=1622 pid=1757 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 11 00:47:12.153000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Jul 11 00:47:12.156000 audit[1760]: NETFILTER_CFG table=filter:56 family=10 entries=1 op=nft_register_rule pid=1760 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 11 00:47:12.156000 audit[1760]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffc1d9d170 a2=0 a3=1 items=0 ppid=1622 pid=1760 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 11 00:47:12.156000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C Jul 11 00:47:12.157000 audit[1761]: NETFILTER_CFG table=nat:57 family=10 entries=1 op=nft_register_chain pid=1761 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 11 00:47:12.157000 audit[1761]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=ffffd52c47f0 a2=0 a3=1 items=0 ppid=1622 pid=1761 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 11 00:47:12.157000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Jul 11 00:47:12.159000 audit[1763]: NETFILTER_CFG table=nat:58 family=10 entries=2 op=nft_register_chain pid=1763 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 11 00:47:12.159000 audit[1763]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=600 a0=3 a1=ffffddfd7f20 a2=0 a3=1 items=0 ppid=1622 pid=1763 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 11 00:47:12.159000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Jul 11 00:47:12.162000 audit[1766]: NETFILTER_CFG table=nat:59 family=10 entries=2 op=nft_register_chain pid=1766 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 11 00:47:12.162000 audit[1766]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=608 a0=3 a1=ffffdb5b13d0 a2=0 a3=1 items=0 ppid=1622 pid=1766 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 11 00:47:12.162000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Jul 11 00:47:12.163000 audit[1767]: NETFILTER_CFG table=nat:60 family=10 entries=1 op=nft_register_chain pid=1767 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 11 00:47:12.163000 audit[1767]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffd106db60 a2=0 a3=1 items=0 ppid=1622 pid=1767 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 11 00:47:12.163000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Jul 11 00:47:12.165000 audit[1769]: NETFILTER_CFG table=nat:61 family=10 entries=2 op=nft_register_chain pid=1769 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 11 00:47:12.165000 audit[1769]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=612 a0=3 a1=fffff902ff10 a2=0 a3=1 items=0 ppid=1622 pid=1769 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 11 00:47:12.165000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Jul 11 00:47:12.166000 audit[1770]: NETFILTER_CFG table=filter:62 family=10 entries=1 op=nft_register_chain pid=1770 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 11 00:47:12.166000 audit[1770]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffc22a8420 a2=0 a3=1 items=0 ppid=1622 pid=1770 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 11 00:47:12.166000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Jul 11 00:47:12.168000 audit[1772]: NETFILTER_CFG table=filter:63 family=10 entries=1 op=nft_register_rule pid=1772 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 11 00:47:12.168000 audit[1772]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=ffffdffe8ee0 a2=0 a3=1 items=0 ppid=1622 pid=1772 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 11 00:47:12.168000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Jul 11 00:47:12.172000 audit[1775]: NETFILTER_CFG table=filter:64 family=10 entries=1 op=nft_register_rule pid=1775 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 11 00:47:12.172000 audit[1775]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=ffffc918df70 a2=0 a3=1 items=0 ppid=1622 pid=1775 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 11 00:47:12.172000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Jul 11 00:47:12.175000 audit[1777]: NETFILTER_CFG table=filter:65 family=10 entries=3 op=nft_register_rule pid=1777 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Jul 11 00:47:12.175000 audit[1777]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2088 a0=3 a1=ffffc217a770 a2=0 a3=1 items=0 ppid=1622 pid=1777 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 11 00:47:12.175000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 11 00:47:12.175000 audit[1777]: NETFILTER_CFG table=nat:66 family=10 entries=7 op=nft_register_chain pid=1777 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Jul 11 00:47:12.175000 audit[1777]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2056 a0=3 a1=ffffc217a770 a2=0 a3=1 items=0 ppid=1622 pid=1777 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 11 00:47:12.175000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 11 00:47:12.252439 kubelet[1454]: E0711 00:47:12.252355 1454 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-nmdwm" podUID="52e0b70b-1770-423a-bbff-f30656e42551" Jul 11 00:47:12.260469 kubelet[1454]: E0711 00:47:12.260434 1454 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Jul 11 00:47:12.288415 kubelet[1454]: E0711 00:47:12.288368 1454 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 11 00:47:12.288415 kubelet[1454]: W0711 00:47:12.288393 1454 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 11 00:47:12.288415 kubelet[1454]: E0711 00:47:12.288414 1454 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 11 00:47:12.288616 kubelet[1454]: E0711 00:47:12.288576 1454 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 11 00:47:12.288616 kubelet[1454]: W0711 00:47:12.288585 1454 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 11 00:47:12.288661 kubelet[1454]: E0711 00:47:12.288619 1454 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 11 00:47:12.288797 kubelet[1454]: E0711 00:47:12.288768 1454 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 11 00:47:12.288797 kubelet[1454]: W0711 00:47:12.288780 1454 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 11 00:47:12.288797 kubelet[1454]: E0711 00:47:12.288789 1454 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 11 00:47:12.288959 kubelet[1454]: E0711 00:47:12.288936 1454 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 11 00:47:12.288959 kubelet[1454]: W0711 00:47:12.288948 1454 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 11 00:47:12.288959 kubelet[1454]: E0711 00:47:12.288955 1454 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 11 00:47:12.289154 kubelet[1454]: E0711 00:47:12.289139 1454 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 11 00:47:12.289154 kubelet[1454]: W0711 00:47:12.289151 1454 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 11 00:47:12.289210 kubelet[1454]: E0711 00:47:12.289163 1454 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 11 00:47:12.289298 kubelet[1454]: E0711 00:47:12.289287 1454 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 11 00:47:12.289298 kubelet[1454]: W0711 00:47:12.289296 1454 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 11 00:47:12.289349 kubelet[1454]: E0711 00:47:12.289304 1454 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 11 00:47:12.289432 kubelet[1454]: E0711 00:47:12.289422 1454 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 11 00:47:12.289432 kubelet[1454]: W0711 00:47:12.289431 1454 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 11 00:47:12.289480 kubelet[1454]: E0711 00:47:12.289438 1454 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 11 00:47:12.289628 kubelet[1454]: E0711 00:47:12.289603 1454 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 11 00:47:12.289628 kubelet[1454]: W0711 00:47:12.289614 1454 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 11 00:47:12.289628 kubelet[1454]: E0711 00:47:12.289620 1454 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 11 00:47:12.289772 kubelet[1454]: E0711 00:47:12.289760 1454 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 11 00:47:12.289772 kubelet[1454]: W0711 00:47:12.289771 1454 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 11 00:47:12.289826 kubelet[1454]: E0711 00:47:12.289779 1454 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 11 00:47:12.289920 kubelet[1454]: E0711 00:47:12.289909 1454 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 11 00:47:12.289920 kubelet[1454]: W0711 00:47:12.289919 1454 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 11 00:47:12.289976 kubelet[1454]: E0711 00:47:12.289926 1454 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 11 00:47:12.290058 kubelet[1454]: E0711 00:47:12.290048 1454 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 11 00:47:12.290081 kubelet[1454]: W0711 00:47:12.290058 1454 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 11 00:47:12.290081 kubelet[1454]: E0711 00:47:12.290065 1454 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 11 00:47:12.290214 kubelet[1454]: E0711 00:47:12.290204 1454 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 11 00:47:12.290243 kubelet[1454]: W0711 00:47:12.290214 1454 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 11 00:47:12.290243 kubelet[1454]: E0711 00:47:12.290222 1454 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 11 00:47:12.290391 kubelet[1454]: E0711 00:47:12.290380 1454 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 11 00:47:12.290391 kubelet[1454]: W0711 00:47:12.290390 1454 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 11 00:47:12.290439 kubelet[1454]: E0711 00:47:12.290397 1454 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 11 00:47:12.290531 kubelet[1454]: E0711 00:47:12.290520 1454 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 11 00:47:12.290531 kubelet[1454]: W0711 00:47:12.290529 1454 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 11 00:47:12.290586 kubelet[1454]: E0711 00:47:12.290536 1454 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 11 00:47:12.290666 kubelet[1454]: E0711 00:47:12.290656 1454 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 11 00:47:12.290666 kubelet[1454]: W0711 00:47:12.290665 1454 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 11 00:47:12.290712 kubelet[1454]: E0711 00:47:12.290672 1454 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 11 00:47:12.290799 kubelet[1454]: E0711 00:47:12.290789 1454 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 11 00:47:12.290826 kubelet[1454]: W0711 00:47:12.290798 1454 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 11 00:47:12.290826 kubelet[1454]: E0711 00:47:12.290805 1454 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 11 00:47:12.290997 kubelet[1454]: E0711 00:47:12.290985 1454 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 11 00:47:12.290997 kubelet[1454]: W0711 00:47:12.290996 1454 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 11 00:47:12.291050 kubelet[1454]: E0711 00:47:12.291005 1454 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 11 00:47:12.291161 kubelet[1454]: E0711 00:47:12.291150 1454 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 11 00:47:12.291161 kubelet[1454]: W0711 00:47:12.291160 1454 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 11 00:47:12.291216 kubelet[1454]: E0711 00:47:12.291167 1454 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 11 00:47:12.291307 kubelet[1454]: E0711 00:47:12.291297 1454 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 11 00:47:12.291331 kubelet[1454]: W0711 00:47:12.291306 1454 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 11 00:47:12.291331 kubelet[1454]: E0711 00:47:12.291314 1454 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 11 00:47:12.291437 kubelet[1454]: E0711 00:47:12.291429 1454 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 11 00:47:12.291465 kubelet[1454]: W0711 00:47:12.291437 1454 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 11 00:47:12.291465 kubelet[1454]: E0711 00:47:12.291445 1454 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 11 00:47:12.291673 kubelet[1454]: E0711 00:47:12.291661 1454 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 11 00:47:12.291673 kubelet[1454]: W0711 00:47:12.291671 1454 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 11 00:47:12.291742 kubelet[1454]: E0711 00:47:12.291680 1454 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 11 00:47:12.291840 kubelet[1454]: E0711 00:47:12.291829 1454 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 11 00:47:12.291840 kubelet[1454]: W0711 00:47:12.291838 1454 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 11 00:47:12.291911 kubelet[1454]: E0711 00:47:12.291846 1454 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 11 00:47:12.292055 kubelet[1454]: E0711 00:47:12.292043 1454 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 11 00:47:12.292055 kubelet[1454]: W0711 00:47:12.292053 1454 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 11 00:47:12.292136 kubelet[1454]: E0711 00:47:12.292061 1454 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 11 00:47:12.292253 kubelet[1454]: E0711 00:47:12.292241 1454 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 11 00:47:12.292253 kubelet[1454]: W0711 00:47:12.292252 1454 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 11 00:47:12.292321 kubelet[1454]: E0711 00:47:12.292260 1454 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 11 00:47:12.292416 kubelet[1454]: E0711 00:47:12.292404 1454 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 11 00:47:12.292416 kubelet[1454]: W0711 00:47:12.292414 1454 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 11 00:47:12.292473 kubelet[1454]: E0711 00:47:12.292422 1454 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 11 00:47:12.292595 kubelet[1454]: E0711 00:47:12.292584 1454 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 11 00:47:12.292595 kubelet[1454]: W0711 00:47:12.292594 1454 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 11 00:47:12.292658 kubelet[1454]: E0711 00:47:12.292602 1454 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 11 00:47:12.292917 kubelet[1454]: E0711 00:47:12.292898 1454 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 11 00:47:12.293013 kubelet[1454]: W0711 00:47:12.292996 1454 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 11 00:47:12.293076 kubelet[1454]: E0711 00:47:12.293063 1454 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 11 00:47:12.293311 kubelet[1454]: E0711 00:47:12.293297 1454 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 11 00:47:12.293384 kubelet[1454]: W0711 00:47:12.293372 1454 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 11 00:47:12.293452 kubelet[1454]: E0711 00:47:12.293440 1454 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 11 00:47:12.293665 kubelet[1454]: E0711 00:47:12.293651 1454 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 11 00:47:12.293735 kubelet[1454]: W0711 00:47:12.293723 1454 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 11 00:47:12.293792 kubelet[1454]: E0711 00:47:12.293781 1454 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 11 00:47:12.294038 kubelet[1454]: E0711 00:47:12.294022 1454 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 11 00:47:12.294155 kubelet[1454]: W0711 00:47:12.294138 1454 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 11 00:47:12.294230 kubelet[1454]: E0711 00:47:12.294218 1454 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 11 00:47:12.294442 kubelet[1454]: E0711 00:47:12.294428 1454 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 11 00:47:12.294515 kubelet[1454]: W0711 00:47:12.294503 1454 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 11 00:47:12.294570 kubelet[1454]: E0711 00:47:12.294559 1454 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 11 00:47:12.294791 kubelet[1454]: E0711 00:47:12.294776 1454 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 11 00:47:12.294874 kubelet[1454]: W0711 00:47:12.294861 1454 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 11 00:47:12.294943 kubelet[1454]: E0711 00:47:12.294931 1454 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 11 00:47:12.612506 env[1214]: time="2025-07-11T00:47:12.612454652Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 11 00:47:12.614464 env[1214]: time="2025-07-11T00:47:12.614433603Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:53f638101e3d73f7dd5e42dc42fb3d94ae1978e8958677222c3de6ec1d8c3d4f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 11 00:47:12.615838 env[1214]: time="2025-07-11T00:47:12.615796057Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 11 00:47:12.617087 env[1214]: time="2025-07-11T00:47:12.617043389Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:972be127eaecd7d1a2d5393b8d14f1ae8f88550bee83e0519e9590c7e15eb41b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 11 00:47:12.617599 env[1214]: time="2025-07-11T00:47:12.617560854Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.2\" returns image reference \"sha256:53f638101e3d73f7dd5e42dc42fb3d94ae1978e8958677222c3de6ec1d8c3d4f\"" Jul 11 00:47:12.620064 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount935716384.mount: Deactivated successfully. Jul 11 00:47:12.622770 env[1214]: time="2025-07-11T00:47:12.622730730Z" level=info msg="CreateContainer within sandbox \"78e0eca540a547ac805529b6f295a730da41f21660a1df960c0cc8b4b54780ce\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Jul 11 00:47:12.633862 env[1214]: time="2025-07-11T00:47:12.633818386Z" level=info msg="CreateContainer within sandbox \"78e0eca540a547ac805529b6f295a730da41f21660a1df960c0cc8b4b54780ce\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"4a4a83a237949d4bb474de7a23972a1d1697a7a0787eddcc0d4c290c669c96f5\"" Jul 11 00:47:12.634281 env[1214]: time="2025-07-11T00:47:12.634253702Z" level=info msg="StartContainer for \"4a4a83a237949d4bb474de7a23972a1d1697a7a0787eddcc0d4c290c669c96f5\"" Jul 11 00:47:12.653010 systemd[1]: Started cri-containerd-4a4a83a237949d4bb474de7a23972a1d1697a7a0787eddcc0d4c290c669c96f5.scope. Jul 11 00:47:12.675000 audit[1818]: AVC avc: denied { perfmon } for pid=1818 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:12.675000 audit[1818]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=1536 pid=1818 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 11 00:47:12.675000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3461346138336132333739343964346262343734646537613233393732 Jul 11 00:47:12.675000 audit[1818]: AVC avc: denied { bpf } for pid=1818 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:12.675000 audit[1818]: AVC avc: denied { bpf } for pid=1818 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:12.675000 audit[1818]: AVC avc: denied { bpf } for pid=1818 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:12.675000 audit[1818]: AVC avc: denied { perfmon } for pid=1818 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:12.675000 audit[1818]: AVC avc: denied { perfmon } for pid=1818 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:12.675000 audit[1818]: AVC avc: denied { perfmon } for pid=1818 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:12.675000 audit[1818]: AVC avc: denied { perfmon } for pid=1818 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:12.675000 audit[1818]: AVC avc: denied { perfmon } for pid=1818 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:12.675000 audit[1818]: AVC avc: denied { bpf } for pid=1818 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:12.675000 audit[1818]: AVC avc: denied { bpf } for pid=1818 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:12.675000 audit: BPF prog-id=66 op=LOAD Jul 11 00:47:12.675000 audit[1818]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=1536 pid=1818 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 11 00:47:12.675000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3461346138336132333739343964346262343734646537613233393732 Jul 11 00:47:12.675000 audit[1818]: AVC avc: denied { bpf } for pid=1818 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:12.675000 audit[1818]: AVC avc: denied { bpf } for pid=1818 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:12.675000 audit[1818]: AVC avc: denied { perfmon } for pid=1818 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:12.675000 audit[1818]: AVC avc: denied { perfmon } for pid=1818 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:12.675000 audit[1818]: AVC avc: denied { perfmon } for pid=1818 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:12.675000 audit[1818]: AVC avc: denied { perfmon } for pid=1818 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:12.675000 audit[1818]: AVC avc: denied { perfmon } for pid=1818 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:12.675000 audit[1818]: AVC avc: denied { bpf } for pid=1818 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:12.675000 audit[1818]: AVC avc: denied { bpf } for pid=1818 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:12.675000 audit: BPF prog-id=67 op=LOAD Jul 11 00:47:12.675000 audit[1818]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=1536 pid=1818 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 11 00:47:12.675000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3461346138336132333739343964346262343734646537613233393732 Jul 11 00:47:12.675000 audit: BPF prog-id=67 op=UNLOAD Jul 11 00:47:12.675000 audit: BPF prog-id=66 op=UNLOAD Jul 11 00:47:12.675000 audit[1818]: AVC avc: denied { bpf } for pid=1818 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:12.675000 audit[1818]: AVC avc: denied { bpf } for pid=1818 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:12.675000 audit[1818]: AVC avc: denied { bpf } for pid=1818 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:12.675000 audit[1818]: AVC avc: denied { perfmon } for pid=1818 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:12.675000 audit[1818]: AVC avc: denied { perfmon } for pid=1818 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:12.675000 audit[1818]: AVC avc: denied { perfmon } for pid=1818 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:12.675000 audit[1818]: AVC avc: denied { perfmon } for pid=1818 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:12.675000 audit[1818]: AVC avc: denied { perfmon } for pid=1818 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:12.675000 audit[1818]: AVC avc: denied { bpf } for pid=1818 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:12.675000 audit[1818]: AVC avc: denied { bpf } for pid=1818 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:12.675000 audit: BPF prog-id=68 op=LOAD Jul 11 00:47:12.675000 audit[1818]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=1536 pid=1818 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 11 00:47:12.675000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3461346138336132333739343964346262343734646537613233393732 Jul 11 00:47:12.687631 env[1214]: time="2025-07-11T00:47:12.687589192Z" level=info msg="StartContainer for \"4a4a83a237949d4bb474de7a23972a1d1697a7a0787eddcc0d4c290c669c96f5\" returns successfully" Jul 11 00:47:12.706726 systemd[1]: cri-containerd-4a4a83a237949d4bb474de7a23972a1d1697a7a0787eddcc0d4c290c669c96f5.scope: Deactivated successfully. Jul 11 00:47:12.711000 audit: BPF prog-id=68 op=UNLOAD Jul 11 00:47:12.770995 env[1214]: time="2025-07-11T00:47:12.770927639Z" level=info msg="shim disconnected" id=4a4a83a237949d4bb474de7a23972a1d1697a7a0787eddcc0d4c290c669c96f5 Jul 11 00:47:12.770995 env[1214]: time="2025-07-11T00:47:12.770980839Z" level=warning msg="cleaning up after shim disconnected" id=4a4a83a237949d4bb474de7a23972a1d1697a7a0787eddcc0d4c290c669c96f5 namespace=k8s.io Jul 11 00:47:12.770995 env[1214]: time="2025-07-11T00:47:12.770992945Z" level=info msg="cleaning up dead shim" Jul 11 00:47:12.776904 env[1214]: time="2025-07-11T00:47:12.776861309Z" level=warning msg="cleanup warnings time=\"2025-07-11T00:47:12Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=1857 runtime=io.containerd.runc.v2\n" Jul 11 00:47:13.035000 audit[1871]: NETFILTER_CFG table=filter:67 family=2 entries=12 op=nft_register_rule pid=1871 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 11 00:47:13.035000 audit[1871]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=4504 a0=3 a1=ffffcf0e1170 a2=0 a3=1 items=0 ppid=1622 pid=1871 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 11 00:47:13.035000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 11 00:47:13.048000 audit[1871]: NETFILTER_CFG table=nat:68 family=2 entries=46 op=nft_register_rule pid=1871 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 11 00:47:13.048000 audit[1871]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=14964 a0=3 a1=ffffcf0e1170 a2=0 a3=1 items=0 ppid=1622 pid=1871 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 11 00:47:13.048000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 11 00:47:13.060179 kubelet[1454]: E0711 00:47:13.060093 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 11 00:47:13.263057 kubelet[1454]: E0711 00:47:13.263015 1454 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Jul 11 00:47:13.264569 env[1214]: time="2025-07-11T00:47:13.264536213Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.30.2\"" Jul 11 00:47:13.285352 kubelet[1454]: I0711 00:47:13.285289 1454 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-proxy-r9hxq" podStartSLOduration=3.717447224 podStartE2EDuration="5.28526216s" podCreationTimestamp="2025-07-11 00:47:08 +0000 UTC" firstStartedPulling="2025-07-11 00:47:10.041227903 +0000 UTC m=+2.501016045" lastFinishedPulling="2025-07-11 00:47:11.609042799 +0000 UTC m=+4.068830981" observedRunningTime="2025-07-11 00:47:12.273949066 +0000 UTC m=+4.733737248" watchObservedRunningTime="2025-07-11 00:47:13.28526216 +0000 UTC m=+5.745050302" Jul 11 00:47:13.620181 systemd[1]: run-containerd-runc-k8s.io-4a4a83a237949d4bb474de7a23972a1d1697a7a0787eddcc0d4c290c669c96f5-runc.7fTRQH.mount: Deactivated successfully. Jul 11 00:47:13.620287 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-4a4a83a237949d4bb474de7a23972a1d1697a7a0787eddcc0d4c290c669c96f5-rootfs.mount: Deactivated successfully. Jul 11 00:47:14.033000 audit[1878]: NETFILTER_CFG table=filter:69 family=2 entries=12 op=nft_register_rule pid=1878 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 11 00:47:14.033000 audit[1878]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=4504 a0=3 a1=ffffca8a1050 a2=0 a3=1 items=0 ppid=1622 pid=1878 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 11 00:47:14.033000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 11 00:47:14.041000 audit[1878]: NETFILTER_CFG table=nat:70 family=2 entries=22 op=nft_register_rule pid=1878 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 11 00:47:14.041000 audit[1878]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6540 a0=3 a1=ffffca8a1050 a2=0 a3=1 items=0 ppid=1622 pid=1878 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 11 00:47:14.041000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 11 00:47:14.060744 kubelet[1454]: E0711 00:47:14.060698 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 11 00:47:14.251753 kubelet[1454]: E0711 00:47:14.251530 1454 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-nmdwm" podUID="52e0b70b-1770-423a-bbff-f30656e42551" Jul 11 00:47:15.051000 audit[1880]: NETFILTER_CFG table=filter:71 family=2 entries=12 op=nft_register_rule pid=1880 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 11 00:47:15.051000 audit[1880]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=4504 a0=3 a1=ffffc0f587d0 a2=0 a3=1 items=0 ppid=1622 pid=1880 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 11 00:47:15.051000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 11 00:47:15.061015 kubelet[1454]: E0711 00:47:15.060969 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 11 00:47:15.064000 audit[1880]: NETFILTER_CFG table=nat:72 family=2 entries=58 op=nft_register_chain pid=1880 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 11 00:47:15.064000 audit[1880]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=20628 a0=3 a1=ffffc0f587d0 a2=0 a3=1 items=0 ppid=1622 pid=1880 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 11 00:47:15.064000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 11 00:47:15.436778 env[1214]: time="2025-07-11T00:47:15.436673333Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.30.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 11 00:47:15.438397 env[1214]: time="2025-07-11T00:47:15.438361319Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:f6e344d58b3c5524e767c7d1dd4cb29c85ce820b0f3005a603532b6a22db5588,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 11 00:47:15.440025 env[1214]: time="2025-07-11T00:47:15.439963524Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.30.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 11 00:47:15.441771 env[1214]: time="2025-07-11T00:47:15.441721937Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:50686775cc60acb78bd92a66fa2d84e1700b2d8e43a718fbadbf35e59baefb4d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 11 00:47:15.442278 env[1214]: time="2025-07-11T00:47:15.442241289Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.30.2\" returns image reference \"sha256:f6e344d58b3c5524e767c7d1dd4cb29c85ce820b0f3005a603532b6a22db5588\"" Jul 11 00:47:15.445843 env[1214]: time="2025-07-11T00:47:15.445797357Z" level=info msg="CreateContainer within sandbox \"78e0eca540a547ac805529b6f295a730da41f21660a1df960c0cc8b4b54780ce\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Jul 11 00:47:15.456176 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount756175093.mount: Deactivated successfully. Jul 11 00:47:15.460884 env[1214]: time="2025-07-11T00:47:15.460830987Z" level=info msg="CreateContainer within sandbox \"78e0eca540a547ac805529b6f295a730da41f21660a1df960c0cc8b4b54780ce\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"c23e2640beb597d229b253ecc39b35e000521da44f5c2443973983d0eea867d4\"" Jul 11 00:47:15.461666 env[1214]: time="2025-07-11T00:47:15.461570275Z" level=info msg="StartContainer for \"c23e2640beb597d229b253ecc39b35e000521da44f5c2443973983d0eea867d4\"" Jul 11 00:47:15.478262 systemd[1]: run-containerd-runc-k8s.io-c23e2640beb597d229b253ecc39b35e000521da44f5c2443973983d0eea867d4-runc.p9SQgB.mount: Deactivated successfully. Jul 11 00:47:15.479689 systemd[1]: Started cri-containerd-c23e2640beb597d229b253ecc39b35e000521da44f5c2443973983d0eea867d4.scope. Jul 11 00:47:15.503000 audit[1890]: AVC avc: denied { perfmon } for pid=1890 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:15.503000 audit[1890]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001c55a0 a2=3c a3=0 items=0 ppid=1536 pid=1890 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 11 00:47:15.503000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6332336532363430626562353937643232396232353365636333396233 Jul 11 00:47:15.503000 audit[1890]: AVC avc: denied { bpf } for pid=1890 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:15.503000 audit[1890]: AVC avc: denied { bpf } for pid=1890 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:15.503000 audit[1890]: AVC avc: denied { bpf } for pid=1890 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:15.503000 audit[1890]: AVC avc: denied { perfmon } for pid=1890 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:15.503000 audit[1890]: AVC avc: denied { perfmon } for pid=1890 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:15.503000 audit[1890]: AVC avc: denied { perfmon } for pid=1890 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:15.503000 audit[1890]: AVC avc: denied { perfmon } for pid=1890 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:15.503000 audit[1890]: AVC avc: denied { perfmon } for pid=1890 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:15.503000 audit[1890]: AVC avc: denied { bpf } for pid=1890 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:15.503000 audit[1890]: AVC avc: denied { bpf } for pid=1890 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:15.503000 audit: BPF prog-id=69 op=LOAD Jul 11 00:47:15.503000 audit[1890]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001c58e0 a2=78 a3=0 items=0 ppid=1536 pid=1890 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 11 00:47:15.503000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6332336532363430626562353937643232396232353365636333396233 Jul 11 00:47:15.503000 audit[1890]: AVC avc: denied { bpf } for pid=1890 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:15.503000 audit[1890]: AVC avc: denied { bpf } for pid=1890 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:15.503000 audit[1890]: AVC avc: denied { perfmon } for pid=1890 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:15.503000 audit[1890]: AVC avc: denied { perfmon } for pid=1890 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:15.503000 audit[1890]: AVC avc: denied { perfmon } for pid=1890 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:15.503000 audit[1890]: AVC avc: denied { perfmon } for pid=1890 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:15.503000 audit[1890]: AVC avc: denied { perfmon } for pid=1890 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:15.503000 audit[1890]: AVC avc: denied { bpf } for pid=1890 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:15.503000 audit[1890]: AVC avc: denied { bpf } for pid=1890 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:15.503000 audit: BPF prog-id=70 op=LOAD Jul 11 00:47:15.503000 audit[1890]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=40001c5670 a2=78 a3=0 items=0 ppid=1536 pid=1890 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 11 00:47:15.503000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6332336532363430626562353937643232396232353365636333396233 Jul 11 00:47:15.503000 audit: BPF prog-id=70 op=UNLOAD Jul 11 00:47:15.503000 audit: BPF prog-id=69 op=UNLOAD Jul 11 00:47:15.503000 audit[1890]: AVC avc: denied { bpf } for pid=1890 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:15.503000 audit[1890]: AVC avc: denied { bpf } for pid=1890 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:15.503000 audit[1890]: AVC avc: denied { bpf } for pid=1890 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:15.503000 audit[1890]: AVC avc: denied { perfmon } for pid=1890 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:15.503000 audit[1890]: AVC avc: denied { perfmon } for pid=1890 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:15.503000 audit[1890]: AVC avc: denied { perfmon } for pid=1890 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:15.503000 audit[1890]: AVC avc: denied { perfmon } for pid=1890 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:15.503000 audit[1890]: AVC avc: denied { perfmon } for pid=1890 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:15.503000 audit[1890]: AVC avc: denied { bpf } for pid=1890 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:15.503000 audit[1890]: AVC avc: denied { bpf } for pid=1890 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:15.503000 audit: BPF prog-id=71 op=LOAD Jul 11 00:47:15.503000 audit[1890]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001c5b40 a2=78 a3=0 items=0 ppid=1536 pid=1890 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 11 00:47:15.503000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6332336532363430626562353937643232396232353365636333396233 Jul 11 00:47:15.516523 env[1214]: time="2025-07-11T00:47:15.516480439Z" level=info msg="StartContainer for \"c23e2640beb597d229b253ecc39b35e000521da44f5c2443973983d0eea867d4\" returns successfully" Jul 11 00:47:16.023197 env[1214]: time="2025-07-11T00:47:16.023139345Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Jul 11 00:47:16.025259 systemd[1]: cri-containerd-c23e2640beb597d229b253ecc39b35e000521da44f5c2443973983d0eea867d4.scope: Deactivated successfully. Jul 11 00:47:16.029000 audit: BPF prog-id=71 op=UNLOAD Jul 11 00:47:16.050012 kubelet[1454]: I0711 00:47:16.049249 1454 kubelet_node_status.go:501] "Fast updating node status as it just became ready" Jul 11 00:47:16.061403 kubelet[1454]: E0711 00:47:16.061366 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 11 00:47:16.080000 audit[1935]: NETFILTER_CFG table=filter:73 family=2 entries=12 op=nft_register_rule pid=1935 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 11 00:47:16.080000 audit[1935]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=4504 a0=3 a1=fffff4c4f1b0 a2=0 a3=1 items=0 ppid=1622 pid=1935 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 11 00:47:16.080000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 11 00:47:16.089000 audit[1935]: NETFILTER_CFG table=nat:74 family=2 entries=22 op=nft_register_rule pid=1935 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 11 00:47:16.089000 audit[1935]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6540 a0=3 a1=fffff4c4f1b0 a2=0 a3=1 items=0 ppid=1622 pid=1935 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 11 00:47:16.089000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 11 00:47:16.208118 env[1214]: time="2025-07-11T00:47:16.208062361Z" level=info msg="shim disconnected" id=c23e2640beb597d229b253ecc39b35e000521da44f5c2443973983d0eea867d4 Jul 11 00:47:16.208246 env[1214]: time="2025-07-11T00:47:16.208128826Z" level=warning msg="cleaning up after shim disconnected" id=c23e2640beb597d229b253ecc39b35e000521da44f5c2443973983d0eea867d4 namespace=k8s.io Jul 11 00:47:16.208246 env[1214]: time="2025-07-11T00:47:16.208138840Z" level=info msg="cleaning up dead shim" Jul 11 00:47:16.214559 env[1214]: time="2025-07-11T00:47:16.214509622Z" level=warning msg="cleanup warnings time=\"2025-07-11T00:47:16Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=1936 runtime=io.containerd.runc.v2\n" Jul 11 00:47:16.256039 systemd[1]: Created slice kubepods-besteffort-pod52e0b70b_1770_423a_bbff_f30656e42551.slice. Jul 11 00:47:16.258415 env[1214]: time="2025-07-11T00:47:16.258381374Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-nmdwm,Uid:52e0b70b-1770-423a-bbff-f30656e42551,Namespace:calico-system,Attempt:0,}" Jul 11 00:47:16.270838 env[1214]: time="2025-07-11T00:47:16.269936990Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.30.2\"" Jul 11 00:47:16.350869 env[1214]: time="2025-07-11T00:47:16.350748471Z" level=error msg="Failed to destroy network for sandbox \"0a0033d58523f38c27965cb412490432d79182bff20f283e23a37a6bd9145483\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 11 00:47:16.351678 env[1214]: time="2025-07-11T00:47:16.351632897Z" level=error msg="encountered an error cleaning up failed sandbox \"0a0033d58523f38c27965cb412490432d79182bff20f283e23a37a6bd9145483\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 11 00:47:16.351751 env[1214]: time="2025-07-11T00:47:16.351688590Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-nmdwm,Uid:52e0b70b-1770-423a-bbff-f30656e42551,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"0a0033d58523f38c27965cb412490432d79182bff20f283e23a37a6bd9145483\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 11 00:47:16.351985 kubelet[1454]: E0711 00:47:16.351942 1454 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"0a0033d58523f38c27965cb412490432d79182bff20f283e23a37a6bd9145483\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 11 00:47:16.352058 kubelet[1454]: E0711 00:47:16.352017 1454 kuberuntime_sandbox.go:70] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"0a0033d58523f38c27965cb412490432d79182bff20f283e23a37a6bd9145483\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-nmdwm" Jul 11 00:47:16.352058 kubelet[1454]: E0711 00:47:16.352038 1454 kuberuntime_manager.go:1252] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"0a0033d58523f38c27965cb412490432d79182bff20f283e23a37a6bd9145483\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-nmdwm" Jul 11 00:47:16.352133 kubelet[1454]: E0711 00:47:16.352094 1454 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-nmdwm_calico-system(52e0b70b-1770-423a-bbff-f30656e42551)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-nmdwm_calico-system(52e0b70b-1770-423a-bbff-f30656e42551)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"0a0033d58523f38c27965cb412490432d79182bff20f283e23a37a6bd9145483\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-nmdwm" podUID="52e0b70b-1770-423a-bbff-f30656e42551" Jul 11 00:47:16.453694 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-c23e2640beb597d229b253ecc39b35e000521da44f5c2443973983d0eea867d4-rootfs.mount: Deactivated successfully. Jul 11 00:47:17.059000 audit[1981]: NETFILTER_CFG table=filter:75 family=2 entries=12 op=nft_register_rule pid=1981 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 11 00:47:17.061964 kubelet[1454]: E0711 00:47:17.061914 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 11 00:47:17.063660 kernel: kauditd_printk_skb: 304 callbacks suppressed Jul 11 00:47:17.063711 kernel: audit: type=1325 audit(1752194837.059:537): table=filter:75 family=2 entries=12 op=nft_register_rule pid=1981 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 11 00:47:17.063734 kernel: audit: type=1300 audit(1752194837.059:537): arch=c00000b7 syscall=211 success=yes exit=4504 a0=3 a1=fffffcc18bb0 a2=0 a3=1 items=0 ppid=1622 pid=1981 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 11 00:47:17.059000 audit[1981]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=4504 a0=3 a1=fffffcc18bb0 a2=0 a3=1 items=0 ppid=1622 pid=1981 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 11 00:47:17.059000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 11 00:47:17.069028 kernel: audit: type=1327 audit(1752194837.059:537): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 11 00:47:17.077000 audit[1981]: NETFILTER_CFG table=nat:76 family=2 entries=22 op=nft_register_rule pid=1981 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 11 00:47:17.077000 audit[1981]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6540 a0=3 a1=fffffcc18bb0 a2=0 a3=1 items=0 ppid=1622 pid=1981 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 11 00:47:17.084447 kernel: audit: type=1325 audit(1752194837.077:538): table=nat:76 family=2 entries=22 op=nft_register_rule pid=1981 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 11 00:47:17.084494 kernel: audit: type=1300 audit(1752194837.077:538): arch=c00000b7 syscall=211 success=yes exit=6540 a0=3 a1=fffffcc18bb0 a2=0 a3=1 items=0 ppid=1622 pid=1981 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 11 00:47:17.084514 kernel: audit: type=1327 audit(1752194837.077:538): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 11 00:47:17.077000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 11 00:47:17.271335 kubelet[1454]: I0711 00:47:17.271280 1454 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="0a0033d58523f38c27965cb412490432d79182bff20f283e23a37a6bd9145483" Jul 11 00:47:17.272222 env[1214]: time="2025-07-11T00:47:17.272173924Z" level=info msg="StopPodSandbox for \"0a0033d58523f38c27965cb412490432d79182bff20f283e23a37a6bd9145483\"" Jul 11 00:47:17.308635 env[1214]: time="2025-07-11T00:47:17.308577349Z" level=error msg="StopPodSandbox for \"0a0033d58523f38c27965cb412490432d79182bff20f283e23a37a6bd9145483\" failed" error="failed to destroy network for sandbox \"0a0033d58523f38c27965cb412490432d79182bff20f283e23a37a6bd9145483\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 11 00:47:17.309031 kubelet[1454]: E0711 00:47:17.308977 1454 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"0a0033d58523f38c27965cb412490432d79182bff20f283e23a37a6bd9145483\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="0a0033d58523f38c27965cb412490432d79182bff20f283e23a37a6bd9145483" Jul 11 00:47:17.309100 kubelet[1454]: E0711 00:47:17.309063 1454 kuberuntime_manager.go:1586] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"0a0033d58523f38c27965cb412490432d79182bff20f283e23a37a6bd9145483"} Jul 11 00:47:17.309143 kubelet[1454]: E0711 00:47:17.309127 1454 kuberuntime_manager.go:1161] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"52e0b70b-1770-423a-bbff-f30656e42551\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"0a0033d58523f38c27965cb412490432d79182bff20f283e23a37a6bd9145483\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Jul 11 00:47:17.309194 kubelet[1454]: E0711 00:47:17.309152 1454 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"52e0b70b-1770-423a-bbff-f30656e42551\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"0a0033d58523f38c27965cb412490432d79182bff20f283e23a37a6bd9145483\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-nmdwm" podUID="52e0b70b-1770-423a-bbff-f30656e42551" Jul 11 00:47:18.062744 kubelet[1454]: E0711 00:47:18.062696 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 11 00:47:19.063791 kubelet[1454]: E0711 00:47:19.063750 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 11 00:47:19.751781 systemd[1]: Created slice kubepods-besteffort-pod049937f9_c2a0_42f2_a17a_1e254bfc7804.slice. Jul 11 00:47:19.933164 kubelet[1454]: I0711 00:47:19.933121 1454 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-njgp4\" (UniqueName: \"kubernetes.io/projected/049937f9-c2a0-42f2-a17a-1e254bfc7804-kube-api-access-njgp4\") pod \"nginx-deployment-7fcdb87857-gnckl\" (UID: \"049937f9-c2a0-42f2-a17a-1e254bfc7804\") " pod="default/nginx-deployment-7fcdb87857-gnckl" Jul 11 00:47:20.055944 env[1214]: time="2025-07-11T00:47:20.055020560Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-7fcdb87857-gnckl,Uid:049937f9-c2a0-42f2-a17a-1e254bfc7804,Namespace:default,Attempt:0,}" Jul 11 00:47:20.064000 kubelet[1454]: E0711 00:47:20.063954 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 11 00:47:20.187127 env[1214]: time="2025-07-11T00:47:20.187049408Z" level=error msg="Failed to destroy network for sandbox \"e6d60429c722ea86d4e9249eb32818ac7b392673244cf67e42f416cd57292a83\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 11 00:47:20.187457 env[1214]: time="2025-07-11T00:47:20.187420035Z" level=error msg="encountered an error cleaning up failed sandbox \"e6d60429c722ea86d4e9249eb32818ac7b392673244cf67e42f416cd57292a83\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 11 00:47:20.187517 env[1214]: time="2025-07-11T00:47:20.187471036Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-7fcdb87857-gnckl,Uid:049937f9-c2a0-42f2-a17a-1e254bfc7804,Namespace:default,Attempt:0,} failed, error" error="failed to setup network for sandbox \"e6d60429c722ea86d4e9249eb32818ac7b392673244cf67e42f416cd57292a83\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 11 00:47:20.188560 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-e6d60429c722ea86d4e9249eb32818ac7b392673244cf67e42f416cd57292a83-shm.mount: Deactivated successfully. Jul 11 00:47:20.189286 kubelet[1454]: E0711 00:47:20.189250 1454 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"e6d60429c722ea86d4e9249eb32818ac7b392673244cf67e42f416cd57292a83\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 11 00:47:20.189355 kubelet[1454]: E0711 00:47:20.189307 1454 kuberuntime_sandbox.go:70] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"e6d60429c722ea86d4e9249eb32818ac7b392673244cf67e42f416cd57292a83\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-7fcdb87857-gnckl" Jul 11 00:47:20.189355 kubelet[1454]: E0711 00:47:20.189327 1454 kuberuntime_manager.go:1252] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"e6d60429c722ea86d4e9249eb32818ac7b392673244cf67e42f416cd57292a83\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-7fcdb87857-gnckl" Jul 11 00:47:20.189415 kubelet[1454]: E0711 00:47:20.189371 1454 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"nginx-deployment-7fcdb87857-gnckl_default(049937f9-c2a0-42f2-a17a-1e254bfc7804)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"nginx-deployment-7fcdb87857-gnckl_default(049937f9-c2a0-42f2-a17a-1e254bfc7804)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"e6d60429c722ea86d4e9249eb32818ac7b392673244cf67e42f416cd57292a83\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-7fcdb87857-gnckl" podUID="049937f9-c2a0-42f2-a17a-1e254bfc7804" Jul 11 00:47:20.277089 kubelet[1454]: I0711 00:47:20.276705 1454 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="e6d60429c722ea86d4e9249eb32818ac7b392673244cf67e42f416cd57292a83" Jul 11 00:47:20.277227 env[1214]: time="2025-07-11T00:47:20.277187125Z" level=info msg="StopPodSandbox for \"e6d60429c722ea86d4e9249eb32818ac7b392673244cf67e42f416cd57292a83\"" Jul 11 00:47:20.297491 env[1214]: time="2025-07-11T00:47:20.297434630Z" level=error msg="StopPodSandbox for \"e6d60429c722ea86d4e9249eb32818ac7b392673244cf67e42f416cd57292a83\" failed" error="failed to destroy network for sandbox \"e6d60429c722ea86d4e9249eb32818ac7b392673244cf67e42f416cd57292a83\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 11 00:47:20.297691 kubelet[1454]: E0711 00:47:20.297651 1454 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"e6d60429c722ea86d4e9249eb32818ac7b392673244cf67e42f416cd57292a83\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="e6d60429c722ea86d4e9249eb32818ac7b392673244cf67e42f416cd57292a83" Jul 11 00:47:20.297745 kubelet[1454]: E0711 00:47:20.297699 1454 kuberuntime_manager.go:1586] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"e6d60429c722ea86d4e9249eb32818ac7b392673244cf67e42f416cd57292a83"} Jul 11 00:47:20.297775 kubelet[1454]: E0711 00:47:20.297748 1454 kuberuntime_manager.go:1161] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"049937f9-c2a0-42f2-a17a-1e254bfc7804\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"e6d60429c722ea86d4e9249eb32818ac7b392673244cf67e42f416cd57292a83\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Jul 11 00:47:20.297824 kubelet[1454]: E0711 00:47:20.297769 1454 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"049937f9-c2a0-42f2-a17a-1e254bfc7804\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"e6d60429c722ea86d4e9249eb32818ac7b392673244cf67e42f416cd57292a83\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-7fcdb87857-gnckl" podUID="049937f9-c2a0-42f2-a17a-1e254bfc7804" Jul 11 00:47:21.064688 kubelet[1454]: E0711 00:47:21.064643 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 11 00:47:21.085872 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2428957036.mount: Deactivated successfully. Jul 11 00:47:21.221915 env[1214]: time="2025-07-11T00:47:21.221863845Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.30.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 11 00:47:21.223405 env[1214]: time="2025-07-11T00:47:21.223370927Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:1c6ddca599ddd18c061e797a7830b0aea985f8b023c5e43d815a9ed1088893a9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 11 00:47:21.224985 env[1214]: time="2025-07-11T00:47:21.224939686Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.30.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 11 00:47:21.226523 env[1214]: time="2025-07-11T00:47:21.226500655Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:e94d49349cc361ef2216d27dda4a097278984d778279f66e79b0616c827c6760,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 11 00:47:21.226913 env[1214]: time="2025-07-11T00:47:21.226891087Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.30.2\" returns image reference \"sha256:1c6ddca599ddd18c061e797a7830b0aea985f8b023c5e43d815a9ed1088893a9\"" Jul 11 00:47:21.239177 env[1214]: time="2025-07-11T00:47:21.239138087Z" level=info msg="CreateContainer within sandbox \"78e0eca540a547ac805529b6f295a730da41f21660a1df960c0cc8b4b54780ce\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Jul 11 00:47:21.250687 env[1214]: time="2025-07-11T00:47:21.250647524Z" level=info msg="CreateContainer within sandbox \"78e0eca540a547ac805529b6f295a730da41f21660a1df960c0cc8b4b54780ce\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"7d3efa61e58eb085bbd887f9918cb640b5c6f4b0ad76d0b7481c6a55f227417e\"" Jul 11 00:47:21.251078 env[1214]: time="2025-07-11T00:47:21.251054294Z" level=info msg="StartContainer for \"7d3efa61e58eb085bbd887f9918cb640b5c6f4b0ad76d0b7481c6a55f227417e\"" Jul 11 00:47:21.265118 systemd[1]: Started cri-containerd-7d3efa61e58eb085bbd887f9918cb640b5c6f4b0ad76d0b7481c6a55f227417e.scope. Jul 11 00:47:21.290000 audit[2064]: AVC avc: denied { perfmon } for pid=2064 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:21.290000 audit[2064]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=1536 pid=2064 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 11 00:47:21.298172 kernel: audit: type=1400 audit(1752194841.290:539): avc: denied { perfmon } for pid=2064 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:21.298231 kernel: audit: type=1300 audit(1752194841.290:539): arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=1536 pid=2064 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 11 00:47:21.298252 kernel: audit: type=1327 audit(1752194841.290:539): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3764336566613631653538656230383562626438383766393931386362 Jul 11 00:47:21.290000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3764336566613631653538656230383562626438383766393931386362 Jul 11 00:47:21.290000 audit[2064]: AVC avc: denied { bpf } for pid=2064 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:21.303813 kernel: audit: type=1400 audit(1752194841.290:540): avc: denied { bpf } for pid=2064 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:21.290000 audit[2064]: AVC avc: denied { bpf } for pid=2064 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:21.290000 audit[2064]: AVC avc: denied { bpf } for pid=2064 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:21.290000 audit[2064]: AVC avc: denied { perfmon } for pid=2064 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:21.290000 audit[2064]: AVC avc: denied { perfmon } for pid=2064 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:21.290000 audit[2064]: AVC avc: denied { perfmon } for pid=2064 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:21.290000 audit[2064]: AVC avc: denied { perfmon } for pid=2064 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:21.290000 audit[2064]: AVC avc: denied { perfmon } for pid=2064 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:21.290000 audit[2064]: AVC avc: denied { bpf } for pid=2064 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:21.290000 audit[2064]: AVC avc: denied { bpf } for pid=2064 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:21.290000 audit: BPF prog-id=72 op=LOAD Jul 11 00:47:21.290000 audit[2064]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=1536 pid=2064 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 11 00:47:21.290000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3764336566613631653538656230383562626438383766393931386362 Jul 11 00:47:21.290000 audit[2064]: AVC avc: denied { bpf } for pid=2064 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:21.290000 audit[2064]: AVC avc: denied { bpf } for pid=2064 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:21.290000 audit[2064]: AVC avc: denied { perfmon } for pid=2064 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:21.290000 audit[2064]: AVC avc: denied { perfmon } for pid=2064 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:21.290000 audit[2064]: AVC avc: denied { perfmon } for pid=2064 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:21.290000 audit[2064]: AVC avc: denied { perfmon } for pid=2064 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:21.290000 audit[2064]: AVC avc: denied { perfmon } for pid=2064 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:21.290000 audit[2064]: AVC avc: denied { bpf } for pid=2064 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:21.290000 audit[2064]: AVC avc: denied { bpf } for pid=2064 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:21.290000 audit: BPF prog-id=73 op=LOAD Jul 11 00:47:21.290000 audit[2064]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=1536 pid=2064 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 11 00:47:21.290000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3764336566613631653538656230383562626438383766393931386362 Jul 11 00:47:21.290000 audit: BPF prog-id=73 op=UNLOAD Jul 11 00:47:21.290000 audit: BPF prog-id=72 op=UNLOAD Jul 11 00:47:21.290000 audit[2064]: AVC avc: denied { bpf } for pid=2064 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:21.290000 audit[2064]: AVC avc: denied { bpf } for pid=2064 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:21.290000 audit[2064]: AVC avc: denied { bpf } for pid=2064 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:21.290000 audit[2064]: AVC avc: denied { perfmon } for pid=2064 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:21.290000 audit[2064]: AVC avc: denied { perfmon } for pid=2064 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:21.290000 audit[2064]: AVC avc: denied { perfmon } for pid=2064 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:21.290000 audit[2064]: AVC avc: denied { perfmon } for pid=2064 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:21.290000 audit[2064]: AVC avc: denied { perfmon } for pid=2064 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:21.290000 audit[2064]: AVC avc: denied { bpf } for pid=2064 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:21.290000 audit[2064]: AVC avc: denied { bpf } for pid=2064 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:21.290000 audit: BPF prog-id=74 op=LOAD Jul 11 00:47:21.290000 audit[2064]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=1536 pid=2064 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 11 00:47:21.290000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3764336566613631653538656230383562626438383766393931386362 Jul 11 00:47:21.313348 env[1214]: time="2025-07-11T00:47:21.313308594Z" level=info msg="StartContainer for \"7d3efa61e58eb085bbd887f9918cb640b5c6f4b0ad76d0b7481c6a55f227417e\" returns successfully" Jul 11 00:47:21.494640 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Jul 11 00:47:21.494746 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. Jul 11 00:47:22.065622 kubelet[1454]: E0711 00:47:22.065579 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 11 00:47:22.303929 kubelet[1454]: I0711 00:47:22.303880 1454 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-node-6wh8d" podStartSLOduration=3.126299399 podStartE2EDuration="14.303865595s" podCreationTimestamp="2025-07-11 00:47:08 +0000 UTC" firstStartedPulling="2025-07-11 00:47:10.050044198 +0000 UTC m=+2.509832380" lastFinishedPulling="2025-07-11 00:47:21.227610434 +0000 UTC m=+13.687398576" observedRunningTime="2025-07-11 00:47:22.303519564 +0000 UTC m=+14.763307746" watchObservedRunningTime="2025-07-11 00:47:22.303865595 +0000 UTC m=+14.763653777" Jul 11 00:47:22.722000 audit[2185]: AVC avc: denied { write } for pid=2185 comm="tee" name="fd" dev="proc" ino=13968 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Jul 11 00:47:22.726301 kernel: kauditd_printk_skb: 39 callbacks suppressed Jul 11 00:47:22.726393 kernel: audit: type=1400 audit(1752194842.722:545): avc: denied { write } for pid=2185 comm="tee" name="fd" dev="proc" ino=13968 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Jul 11 00:47:22.726419 kernel: audit: type=1300 audit(1752194842.722:545): arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffdfa917e4 a2=241 a3=1b6 items=1 ppid=2136 pid=2185 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 11 00:47:22.722000 audit[2185]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffdfa917e4 a2=241 a3=1b6 items=1 ppid=2136 pid=2185 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 11 00:47:22.722000 audit: CWD cwd="/etc/service/enabled/cni/log" Jul 11 00:47:22.730798 kernel: audit: type=1307 audit(1752194842.722:545): cwd="/etc/service/enabled/cni/log" Jul 11 00:47:22.730878 kernel: audit: type=1302 audit(1752194842.722:545): item=0 name="/dev/fd/63" inode=15599 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 11 00:47:22.722000 audit: PATH item=0 name="/dev/fd/63" inode=15599 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 11 00:47:22.722000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Jul 11 00:47:22.736764 kernel: audit: type=1327 audit(1752194842.722:545): proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Jul 11 00:47:22.736825 kernel: audit: type=1400 audit(1752194842.727:546): avc: denied { write } for pid=2198 comm="tee" name="fd" dev="proc" ino=13974 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Jul 11 00:47:22.727000 audit[2198]: AVC avc: denied { write } for pid=2198 comm="tee" name="fd" dev="proc" ino=13974 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Jul 11 00:47:22.727000 audit[2198]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=fffff10aa7e2 a2=241 a3=1b6 items=1 ppid=2138 pid=2198 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 11 00:47:22.744298 kernel: audit: type=1300 audit(1752194842.727:546): arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=fffff10aa7e2 a2=241 a3=1b6 items=1 ppid=2138 pid=2198 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 11 00:47:22.744365 kernel: audit: type=1307 audit(1752194842.727:546): cwd="/etc/service/enabled/felix/log" Jul 11 00:47:22.727000 audit: CWD cwd="/etc/service/enabled/felix/log" Jul 11 00:47:22.727000 audit: PATH item=0 name="/dev/fd/63" inode=13971 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 11 00:47:22.749133 kernel: audit: type=1302 audit(1752194842.727:546): item=0 name="/dev/fd/63" inode=13971 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 11 00:47:22.749198 kernel: audit: type=1327 audit(1752194842.727:546): proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Jul 11 00:47:22.727000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Jul 11 00:47:22.728000 audit[2196]: AVC avc: denied { write } for pid=2196 comm="tee" name="fd" dev="proc" ino=13978 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Jul 11 00:47:22.728000 audit[2196]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=fffffd85f7e2 a2=241 a3=1b6 items=1 ppid=2137 pid=2196 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 11 00:47:22.728000 audit: CWD cwd="/etc/service/enabled/bird6/log" Jul 11 00:47:22.728000 audit: PATH item=0 name="/dev/fd/63" inode=15602 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 11 00:47:22.728000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Jul 11 00:47:22.729000 audit[2192]: AVC avc: denied { write } for pid=2192 comm="tee" name="fd" dev="proc" ino=13309 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Jul 11 00:47:22.729000 audit[2192]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffda26e7d2 a2=241 a3=1b6 items=1 ppid=2132 pid=2192 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 11 00:47:22.729000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Jul 11 00:47:22.729000 audit: PATH item=0 name="/dev/fd/63" inode=13305 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 11 00:47:22.729000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Jul 11 00:47:22.731000 audit[2189]: AVC avc: denied { write } for pid=2189 comm="tee" name="fd" dev="proc" ino=16385 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Jul 11 00:47:22.731000 audit[2189]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffe1d097e2 a2=241 a3=1b6 items=1 ppid=2144 pid=2189 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 11 00:47:22.731000 audit: CWD cwd="/etc/service/enabled/confd/log" Jul 11 00:47:22.731000 audit: PATH item=0 name="/dev/fd/63" inode=13304 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 11 00:47:22.731000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Jul 11 00:47:22.732000 audit[2193]: AVC avc: denied { write } for pid=2193 comm="tee" name="fd" dev="proc" ino=13982 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Jul 11 00:47:22.732000 audit[2193]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffec7c97d3 a2=241 a3=1b6 items=1 ppid=2131 pid=2193 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 11 00:47:22.732000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Jul 11 00:47:22.732000 audit: PATH item=0 name="/dev/fd/63" inode=13970 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 11 00:47:22.732000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Jul 11 00:47:22.762000 audit[2201]: AVC avc: denied { write } for pid=2201 comm="tee" name="fd" dev="proc" ino=14747 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Jul 11 00:47:22.762000 audit[2201]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffd689d7e3 a2=241 a3=1b6 items=1 ppid=2139 pid=2201 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 11 00:47:22.762000 audit: CWD cwd="/etc/service/enabled/bird/log" Jul 11 00:47:22.762000 audit: PATH item=0 name="/dev/fd/63" inode=13306 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 11 00:47:22.762000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Jul 11 00:47:22.852000 audit[2234]: AVC avc: denied { bpf } for pid=2234 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:22.852000 audit[2234]: AVC avc: denied { bpf } for pid=2234 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:22.852000 audit[2234]: AVC avc: denied { perfmon } for pid=2234 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:22.852000 audit[2234]: AVC avc: denied { perfmon } for pid=2234 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:22.852000 audit[2234]: AVC avc: denied { perfmon } for pid=2234 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:22.852000 audit[2234]: AVC avc: denied { perfmon } for pid=2234 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:22.852000 audit[2234]: AVC avc: denied { perfmon } for pid=2234 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:22.852000 audit[2234]: AVC avc: denied { bpf } for pid=2234 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:22.852000 audit[2234]: AVC avc: denied { bpf } for pid=2234 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:22.852000 audit: BPF prog-id=75 op=LOAD Jul 11 00:47:22.852000 audit[2234]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffff280d18 a2=98 a3=ffffff280d08 items=0 ppid=2141 pid=2234 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 11 00:47:22.852000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F74632F676C6F62616C732F63616C695F63746C625F70726F677300747970650070726F675F6172726179006B657900340076616C7565003400656E74726965730033006E616D650063616C695F63746C625F70726F677300666C6167730030 Jul 11 00:47:22.853000 audit: BPF prog-id=75 op=UNLOAD Jul 11 00:47:22.853000 audit[2234]: AVC avc: denied { bpf } for pid=2234 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:22.853000 audit[2234]: AVC avc: denied { bpf } for pid=2234 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:22.853000 audit[2234]: AVC avc: denied { perfmon } for pid=2234 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:22.853000 audit[2234]: AVC avc: denied { perfmon } for pid=2234 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:22.853000 audit[2234]: AVC avc: denied { perfmon } for pid=2234 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:22.853000 audit[2234]: AVC avc: denied { perfmon } for pid=2234 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:22.853000 audit[2234]: AVC avc: denied { perfmon } for pid=2234 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:22.853000 audit[2234]: AVC avc: denied { bpf } for pid=2234 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:22.853000 audit[2234]: AVC avc: denied { bpf } for pid=2234 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:22.853000 audit: BPF prog-id=76 op=LOAD Jul 11 00:47:22.853000 audit[2234]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffff280bc8 a2=74 a3=95 items=0 ppid=2141 pid=2234 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 11 00:47:22.853000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F74632F676C6F62616C732F63616C695F63746C625F70726F677300747970650070726F675F6172726179006B657900340076616C7565003400656E74726965730033006E616D650063616C695F63746C625F70726F677300666C6167730030 Jul 11 00:47:22.853000 audit: BPF prog-id=76 op=UNLOAD Jul 11 00:47:22.854000 audit[2234]: AVC avc: denied { bpf } for pid=2234 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:22.854000 audit[2234]: AVC avc: denied { bpf } for pid=2234 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:22.854000 audit[2234]: AVC avc: denied { perfmon } for pid=2234 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:22.854000 audit[2234]: AVC avc: denied { perfmon } for pid=2234 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:22.854000 audit[2234]: AVC avc: denied { perfmon } for pid=2234 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:22.854000 audit[2234]: AVC avc: denied { perfmon } for pid=2234 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:22.854000 audit[2234]: AVC avc: denied { perfmon } for pid=2234 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:22.854000 audit[2234]: AVC avc: denied { bpf } for pid=2234 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:22.854000 audit[2234]: AVC avc: denied { bpf } for pid=2234 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:22.854000 audit: BPF prog-id=77 op=LOAD Jul 11 00:47:22.854000 audit[2234]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffff280bf8 a2=40 a3=ffffff280c28 items=0 ppid=2141 pid=2234 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 11 00:47:22.854000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F74632F676C6F62616C732F63616C695F63746C625F70726F677300747970650070726F675F6172726179006B657900340076616C7565003400656E74726965730033006E616D650063616C695F63746C625F70726F677300666C6167730030 Jul 11 00:47:22.854000 audit: BPF prog-id=77 op=UNLOAD Jul 11 00:47:22.854000 audit[2234]: AVC avc: denied { perfmon } for pid=2234 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:22.854000 audit[2234]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=0 a1=ffffff280d10 a2=50 a3=0 items=0 ppid=2141 pid=2234 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 11 00:47:22.854000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F74632F676C6F62616C732F63616C695F63746C625F70726F677300747970650070726F675F6172726179006B657900340076616C7565003400656E74726965730033006E616D650063616C695F63746C625F70726F677300666C6167730030 Jul 11 00:47:22.855000 audit[2242]: AVC avc: denied { bpf } for pid=2242 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:22.855000 audit[2242]: AVC avc: denied { bpf } for pid=2242 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:22.855000 audit[2242]: AVC avc: denied { perfmon } for pid=2242 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:22.855000 audit[2242]: AVC avc: denied { perfmon } for pid=2242 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:22.855000 audit[2242]: AVC avc: denied { perfmon } for pid=2242 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:22.855000 audit[2242]: AVC avc: denied { perfmon } for pid=2242 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:22.855000 audit[2242]: AVC avc: denied { perfmon } for pid=2242 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:22.855000 audit[2242]: AVC avc: denied { bpf } for pid=2242 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:22.855000 audit[2242]: AVC avc: denied { bpf } for pid=2242 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:22.855000 audit: BPF prog-id=78 op=LOAD Jul 11 00:47:22.855000 audit[2242]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffd7320388 a2=98 a3=ffffd7320378 items=0 ppid=2141 pid=2242 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 11 00:47:22.855000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Jul 11 00:47:22.856000 audit: BPF prog-id=78 op=UNLOAD Jul 11 00:47:22.856000 audit[2242]: AVC avc: denied { bpf } for pid=2242 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:22.856000 audit[2242]: AVC avc: denied { bpf } for pid=2242 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:22.856000 audit[2242]: AVC avc: denied { perfmon } for pid=2242 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:22.856000 audit[2242]: AVC avc: denied { perfmon } for pid=2242 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:22.856000 audit[2242]: AVC avc: denied { perfmon } for pid=2242 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:22.856000 audit[2242]: AVC avc: denied { perfmon } for pid=2242 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:22.856000 audit[2242]: AVC avc: denied { perfmon } for pid=2242 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:22.856000 audit[2242]: AVC avc: denied { bpf } for pid=2242 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:22.856000 audit[2242]: AVC avc: denied { bpf } for pid=2242 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:22.856000 audit: BPF prog-id=79 op=LOAD Jul 11 00:47:22.856000 audit[2242]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=ffffd7320018 a2=74 a3=95 items=0 ppid=2141 pid=2242 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 11 00:47:22.856000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Jul 11 00:47:22.856000 audit: BPF prog-id=79 op=UNLOAD Jul 11 00:47:22.856000 audit[2242]: AVC avc: denied { bpf } for pid=2242 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:22.856000 audit[2242]: AVC avc: denied { bpf } for pid=2242 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:22.856000 audit[2242]: AVC avc: denied { perfmon } for pid=2242 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:22.856000 audit[2242]: AVC avc: denied { perfmon } for pid=2242 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:22.856000 audit[2242]: AVC avc: denied { perfmon } for pid=2242 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:22.856000 audit[2242]: AVC avc: denied { perfmon } for pid=2242 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:22.856000 audit[2242]: AVC avc: denied { perfmon } for pid=2242 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:22.856000 audit[2242]: AVC avc: denied { bpf } for pid=2242 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:22.856000 audit[2242]: AVC avc: denied { bpf } for pid=2242 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:22.856000 audit: BPF prog-id=80 op=LOAD Jul 11 00:47:22.856000 audit[2242]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=ffffd7320078 a2=94 a3=2 items=0 ppid=2141 pid=2242 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 11 00:47:22.856000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Jul 11 00:47:22.856000 audit: BPF prog-id=80 op=UNLOAD Jul 11 00:47:22.942000 audit[2242]: AVC avc: denied { bpf } for pid=2242 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:22.942000 audit[2242]: AVC avc: denied { bpf } for pid=2242 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:22.942000 audit[2242]: AVC avc: denied { perfmon } for pid=2242 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:22.942000 audit[2242]: AVC avc: denied { perfmon } for pid=2242 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:22.942000 audit[2242]: AVC avc: denied { perfmon } for pid=2242 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:22.942000 audit[2242]: AVC avc: denied { perfmon } for pid=2242 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:22.942000 audit[2242]: AVC avc: denied { perfmon } for pid=2242 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:22.942000 audit[2242]: AVC avc: denied { bpf } for pid=2242 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:22.942000 audit[2242]: AVC avc: denied { bpf } for pid=2242 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:22.942000 audit: BPF prog-id=81 op=LOAD Jul 11 00:47:22.942000 audit[2242]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=ffffd7320038 a2=40 a3=ffffd7320068 items=0 ppid=2141 pid=2242 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 11 00:47:22.942000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Jul 11 00:47:22.942000 audit: BPF prog-id=81 op=UNLOAD Jul 11 00:47:22.942000 audit[2242]: AVC avc: denied { perfmon } for pid=2242 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:22.942000 audit[2242]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=0 a1=ffffd7320150 a2=50 a3=0 items=0 ppid=2141 pid=2242 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 11 00:47:22.942000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Jul 11 00:47:22.950000 audit[2242]: AVC avc: denied { bpf } for pid=2242 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:22.950000 audit[2242]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffd73200a8 a2=28 a3=ffffd73201d8 items=0 ppid=2141 pid=2242 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 11 00:47:22.950000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Jul 11 00:47:22.951000 audit[2242]: AVC avc: denied { bpf } for pid=2242 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:22.951000 audit[2242]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffd73200d8 a2=28 a3=ffffd7320208 items=0 ppid=2141 pid=2242 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 11 00:47:22.951000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Jul 11 00:47:22.951000 audit[2242]: AVC avc: denied { bpf } for pid=2242 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:22.951000 audit[2242]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffd731ff88 a2=28 a3=ffffd73200b8 items=0 ppid=2141 pid=2242 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 11 00:47:22.951000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Jul 11 00:47:22.951000 audit[2242]: AVC avc: denied { bpf } for pid=2242 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:22.951000 audit[2242]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffd73200f8 a2=28 a3=ffffd7320228 items=0 ppid=2141 pid=2242 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 11 00:47:22.951000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Jul 11 00:47:22.951000 audit[2242]: AVC avc: denied { bpf } for pid=2242 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:22.951000 audit[2242]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffd73200d8 a2=28 a3=ffffd7320208 items=0 ppid=2141 pid=2242 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 11 00:47:22.951000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Jul 11 00:47:22.951000 audit[2242]: AVC avc: denied { bpf } for pid=2242 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:22.951000 audit[2242]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffd73200c8 a2=28 a3=ffffd73201f8 items=0 ppid=2141 pid=2242 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 11 00:47:22.951000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Jul 11 00:47:22.951000 audit[2242]: AVC avc: denied { bpf } for pid=2242 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:22.951000 audit[2242]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffd73200f8 a2=28 a3=ffffd7320228 items=0 ppid=2141 pid=2242 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 11 00:47:22.951000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Jul 11 00:47:22.951000 audit[2242]: AVC avc: denied { bpf } for pid=2242 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:22.951000 audit[2242]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffd73200d8 a2=28 a3=ffffd7320208 items=0 ppid=2141 pid=2242 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 11 00:47:22.951000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Jul 11 00:47:22.951000 audit[2242]: AVC avc: denied { bpf } for pid=2242 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:22.951000 audit[2242]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffd73200f8 a2=28 a3=ffffd7320228 items=0 ppid=2141 pid=2242 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 11 00:47:22.951000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Jul 11 00:47:22.951000 audit[2242]: AVC avc: denied { bpf } for pid=2242 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:22.951000 audit[2242]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffd73200c8 a2=28 a3=ffffd73201f8 items=0 ppid=2141 pid=2242 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 11 00:47:22.951000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Jul 11 00:47:22.951000 audit[2242]: AVC avc: denied { bpf } for pid=2242 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:22.951000 audit[2242]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffd7320148 a2=28 a3=ffffd7320288 items=0 ppid=2141 pid=2242 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 11 00:47:22.951000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Jul 11 00:47:22.951000 audit[2242]: AVC avc: denied { perfmon } for pid=2242 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:22.951000 audit[2242]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=0 a1=ffffd731fe80 a2=50 a3=0 items=0 ppid=2141 pid=2242 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 11 00:47:22.951000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Jul 11 00:47:22.951000 audit[2242]: AVC avc: denied { bpf } for pid=2242 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:22.951000 audit[2242]: AVC avc: denied { bpf } for pid=2242 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:22.951000 audit[2242]: AVC avc: denied { perfmon } for pid=2242 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:22.951000 audit[2242]: AVC avc: denied { perfmon } for pid=2242 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:22.951000 audit[2242]: AVC avc: denied { perfmon } for pid=2242 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:22.951000 audit[2242]: AVC avc: denied { perfmon } for pid=2242 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:22.951000 audit[2242]: AVC avc: denied { perfmon } for pid=2242 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:22.951000 audit[2242]: AVC avc: denied { bpf } for pid=2242 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:22.951000 audit[2242]: AVC avc: denied { bpf } for pid=2242 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:22.951000 audit: BPF prog-id=82 op=LOAD Jul 11 00:47:22.951000 audit[2242]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=ffffd731fe88 a2=94 a3=5 items=0 ppid=2141 pid=2242 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 11 00:47:22.951000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Jul 11 00:47:22.951000 audit: BPF prog-id=82 op=UNLOAD Jul 11 00:47:22.951000 audit[2242]: AVC avc: denied { perfmon } for pid=2242 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:22.951000 audit[2242]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=0 a1=ffffd731ff90 a2=50 a3=0 items=0 ppid=2141 pid=2242 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 11 00:47:22.951000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Jul 11 00:47:22.951000 audit[2242]: AVC avc: denied { bpf } for pid=2242 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:22.951000 audit[2242]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=16 a1=ffffd73200d8 a2=4 a3=3 items=0 ppid=2141 pid=2242 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 11 00:47:22.951000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Jul 11 00:47:22.951000 audit[2242]: AVC avc: denied { bpf } for pid=2242 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:22.951000 audit[2242]: AVC avc: denied { bpf } for pid=2242 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:22.951000 audit[2242]: AVC avc: denied { perfmon } for pid=2242 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:22.951000 audit[2242]: AVC avc: denied { bpf } for pid=2242 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:22.951000 audit[2242]: AVC avc: denied { perfmon } for pid=2242 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:22.951000 audit[2242]: AVC avc: denied { perfmon } for pid=2242 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:22.951000 audit[2242]: AVC avc: denied { perfmon } for pid=2242 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:22.951000 audit[2242]: AVC avc: denied { perfmon } for pid=2242 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:22.951000 audit[2242]: AVC avc: denied { perfmon } for pid=2242 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:22.951000 audit[2242]: AVC avc: denied { bpf } for pid=2242 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:22.951000 audit[2242]: AVC avc: denied { confidentiality } for pid=2242 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 11 00:47:22.951000 audit[2242]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=ffffd73200b8 a2=94 a3=6 items=0 ppid=2141 pid=2242 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 11 00:47:22.951000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Jul 11 00:47:22.951000 audit[2242]: AVC avc: denied { bpf } for pid=2242 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:22.951000 audit[2242]: AVC avc: denied { bpf } for pid=2242 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:22.951000 audit[2242]: AVC avc: denied { perfmon } for pid=2242 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:22.951000 audit[2242]: AVC avc: denied { bpf } for pid=2242 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:22.951000 audit[2242]: AVC avc: denied { perfmon } for pid=2242 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:22.951000 audit[2242]: AVC avc: denied { perfmon } for pid=2242 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:22.951000 audit[2242]: AVC avc: denied { perfmon } for pid=2242 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:22.951000 audit[2242]: AVC avc: denied { perfmon } for pid=2242 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:22.951000 audit[2242]: AVC avc: denied { perfmon } for pid=2242 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:22.951000 audit[2242]: AVC avc: denied { bpf } for pid=2242 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:22.951000 audit[2242]: AVC avc: denied { confidentiality } for pid=2242 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 11 00:47:22.951000 audit[2242]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=ffffd731f888 a2=94 a3=83 items=0 ppid=2141 pid=2242 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 11 00:47:22.951000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Jul 11 00:47:22.951000 audit[2242]: AVC avc: denied { bpf } for pid=2242 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:22.951000 audit[2242]: AVC avc: denied { bpf } for pid=2242 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:22.951000 audit[2242]: AVC avc: denied { perfmon } for pid=2242 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:22.951000 audit[2242]: AVC avc: denied { bpf } for pid=2242 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:22.951000 audit[2242]: AVC avc: denied { perfmon } for pid=2242 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:22.951000 audit[2242]: AVC avc: denied { perfmon } for pid=2242 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:22.951000 audit[2242]: AVC avc: denied { perfmon } for pid=2242 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:22.951000 audit[2242]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=ffffd731f888 a2=94 a3=83 items=0 ppid=2141 pid=2242 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 11 00:47:22.951000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Jul 11 00:47:22.964000 audit[2252]: AVC avc: denied { bpf } for pid=2252 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:22.964000 audit[2252]: AVC avc: denied { bpf } for pid=2252 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:22.964000 audit[2252]: AVC avc: denied { perfmon } for pid=2252 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:22.964000 audit[2252]: AVC avc: denied { perfmon } for pid=2252 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:22.964000 audit[2252]: AVC avc: denied { perfmon } for pid=2252 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:22.964000 audit[2252]: AVC avc: denied { perfmon } for pid=2252 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:22.964000 audit[2252]: AVC avc: denied { perfmon } for pid=2252 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:22.964000 audit[2252]: AVC avc: denied { bpf } for pid=2252 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:22.964000 audit[2252]: AVC avc: denied { bpf } for pid=2252 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:22.964000 audit: BPF prog-id=83 op=LOAD Jul 11 00:47:22.964000 audit[2252]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffedd9a078 a2=98 a3=ffffedd9a068 items=0 ppid=2141 pid=2252 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 11 00:47:22.964000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Jul 11 00:47:22.964000 audit: BPF prog-id=83 op=UNLOAD Jul 11 00:47:22.964000 audit[2252]: AVC avc: denied { bpf } for pid=2252 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:22.964000 audit[2252]: AVC avc: denied { bpf } for pid=2252 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:22.964000 audit[2252]: AVC avc: denied { perfmon } for pid=2252 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:22.964000 audit[2252]: AVC avc: denied { perfmon } for pid=2252 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:22.964000 audit[2252]: AVC avc: denied { perfmon } for pid=2252 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:22.964000 audit[2252]: AVC avc: denied { perfmon } for pid=2252 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:22.964000 audit[2252]: AVC avc: denied { perfmon } for pid=2252 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:22.964000 audit[2252]: AVC avc: denied { bpf } for pid=2252 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:22.964000 audit[2252]: AVC avc: denied { bpf } for pid=2252 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:22.964000 audit: BPF prog-id=84 op=LOAD Jul 11 00:47:22.964000 audit[2252]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffedd99f28 a2=74 a3=95 items=0 ppid=2141 pid=2252 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 11 00:47:22.964000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Jul 11 00:47:22.964000 audit: BPF prog-id=84 op=UNLOAD Jul 11 00:47:22.964000 audit[2252]: AVC avc: denied { bpf } for pid=2252 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:22.964000 audit[2252]: AVC avc: denied { bpf } for pid=2252 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:22.964000 audit[2252]: AVC avc: denied { perfmon } for pid=2252 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:22.964000 audit[2252]: AVC avc: denied { perfmon } for pid=2252 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:22.964000 audit[2252]: AVC avc: denied { perfmon } for pid=2252 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:22.964000 audit[2252]: AVC avc: denied { perfmon } for pid=2252 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:22.964000 audit[2252]: AVC avc: denied { perfmon } for pid=2252 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:22.964000 audit[2252]: AVC avc: denied { bpf } for pid=2252 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:22.964000 audit[2252]: AVC avc: denied { bpf } for pid=2252 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:22.964000 audit: BPF prog-id=85 op=LOAD Jul 11 00:47:22.964000 audit[2252]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffedd99f58 a2=40 a3=ffffedd99f88 items=0 ppid=2141 pid=2252 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 11 00:47:22.964000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Jul 11 00:47:22.964000 audit: BPF prog-id=85 op=UNLOAD Jul 11 00:47:23.018612 systemd-networkd[1057]: vxlan.calico: Link UP Jul 11 00:47:23.018618 systemd-networkd[1057]: vxlan.calico: Gained carrier Jul 11 00:47:23.034000 audit[2278]: AVC avc: denied { bpf } for pid=2278 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:23.034000 audit[2278]: AVC avc: denied { bpf } for pid=2278 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:23.034000 audit[2278]: AVC avc: denied { perfmon } for pid=2278 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:23.034000 audit[2278]: AVC avc: denied { perfmon } for pid=2278 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:23.034000 audit[2278]: AVC avc: denied { perfmon } for pid=2278 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:23.034000 audit[2278]: AVC avc: denied { perfmon } for pid=2278 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:23.034000 audit[2278]: AVC avc: denied { perfmon } for pid=2278 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:23.034000 audit[2278]: AVC avc: denied { bpf } for pid=2278 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:23.034000 audit[2278]: AVC avc: denied { bpf } for pid=2278 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:23.034000 audit: BPF prog-id=86 op=LOAD Jul 11 00:47:23.034000 audit[2278]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffde900598 a2=98 a3=ffffde900588 items=0 ppid=2141 pid=2278 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 11 00:47:23.034000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 11 00:47:23.034000 audit: BPF prog-id=86 op=UNLOAD Jul 11 00:47:23.034000 audit[2278]: AVC avc: denied { bpf } for pid=2278 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:23.034000 audit[2278]: AVC avc: denied { bpf } for pid=2278 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:23.034000 audit[2278]: AVC avc: denied { perfmon } for pid=2278 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:23.034000 audit[2278]: AVC avc: denied { perfmon } for pid=2278 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:23.034000 audit[2278]: AVC avc: denied { perfmon } for pid=2278 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:23.034000 audit[2278]: AVC avc: denied { perfmon } for pid=2278 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:23.034000 audit[2278]: AVC avc: denied { perfmon } for pid=2278 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:23.034000 audit[2278]: AVC avc: denied { bpf } for pid=2278 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:23.034000 audit[2278]: AVC avc: denied { bpf } for pid=2278 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:23.034000 audit: BPF prog-id=87 op=LOAD Jul 11 00:47:23.034000 audit[2278]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffde900278 a2=74 a3=95 items=0 ppid=2141 pid=2278 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 11 00:47:23.034000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 11 00:47:23.035000 audit: BPF prog-id=87 op=UNLOAD Jul 11 00:47:23.035000 audit[2278]: AVC avc: denied { bpf } for pid=2278 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:23.035000 audit[2278]: AVC avc: denied { bpf } for pid=2278 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:23.035000 audit[2278]: AVC avc: denied { perfmon } for pid=2278 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:23.035000 audit[2278]: AVC avc: denied { perfmon } for pid=2278 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:23.035000 audit[2278]: AVC avc: denied { perfmon } for pid=2278 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:23.035000 audit[2278]: AVC avc: denied { perfmon } for pid=2278 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:23.035000 audit[2278]: AVC avc: denied { perfmon } for pid=2278 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:23.035000 audit[2278]: AVC avc: denied { bpf } for pid=2278 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:23.035000 audit[2278]: AVC avc: denied { bpf } for pid=2278 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:23.035000 audit: BPF prog-id=88 op=LOAD Jul 11 00:47:23.035000 audit[2278]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffde9002d8 a2=94 a3=2 items=0 ppid=2141 pid=2278 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 11 00:47:23.035000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 11 00:47:23.035000 audit: BPF prog-id=88 op=UNLOAD Jul 11 00:47:23.035000 audit[2278]: AVC avc: denied { bpf } for pid=2278 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:23.035000 audit[2278]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=ffffde900308 a2=28 a3=ffffde900438 items=0 ppid=2141 pid=2278 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 11 00:47:23.035000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 11 00:47:23.035000 audit[2278]: AVC avc: denied { bpf } for pid=2278 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:23.035000 audit[2278]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffde900338 a2=28 a3=ffffde900468 items=0 ppid=2141 pid=2278 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 11 00:47:23.035000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 11 00:47:23.035000 audit[2278]: AVC avc: denied { bpf } for pid=2278 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:23.035000 audit[2278]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffde9001e8 a2=28 a3=ffffde900318 items=0 ppid=2141 pid=2278 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 11 00:47:23.035000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 11 00:47:23.035000 audit[2278]: AVC avc: denied { bpf } for pid=2278 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:23.035000 audit[2278]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=ffffde900358 a2=28 a3=ffffde900488 items=0 ppid=2141 pid=2278 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 11 00:47:23.035000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 11 00:47:23.035000 audit[2278]: AVC avc: denied { bpf } for pid=2278 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:23.035000 audit[2278]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=ffffde900338 a2=28 a3=ffffde900468 items=0 ppid=2141 pid=2278 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 11 00:47:23.035000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 11 00:47:23.035000 audit[2278]: AVC avc: denied { bpf } for pid=2278 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:23.035000 audit[2278]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=ffffde900328 a2=28 a3=ffffde900458 items=0 ppid=2141 pid=2278 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 11 00:47:23.035000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 11 00:47:23.035000 audit[2278]: AVC avc: denied { bpf } for pid=2278 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:23.035000 audit[2278]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=ffffde900358 a2=28 a3=ffffde900488 items=0 ppid=2141 pid=2278 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 11 00:47:23.035000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 11 00:47:23.035000 audit[2278]: AVC avc: denied { bpf } for pid=2278 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:23.035000 audit[2278]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffde900338 a2=28 a3=ffffde900468 items=0 ppid=2141 pid=2278 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 11 00:47:23.035000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 11 00:47:23.035000 audit[2278]: AVC avc: denied { bpf } for pid=2278 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:23.035000 audit[2278]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffde900358 a2=28 a3=ffffde900488 items=0 ppid=2141 pid=2278 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 11 00:47:23.035000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 11 00:47:23.035000 audit[2278]: AVC avc: denied { bpf } for pid=2278 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:23.035000 audit[2278]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffde900328 a2=28 a3=ffffde900458 items=0 ppid=2141 pid=2278 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 11 00:47:23.035000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 11 00:47:23.035000 audit[2278]: AVC avc: denied { bpf } for pid=2278 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:23.035000 audit[2278]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=ffffde9003a8 a2=28 a3=ffffde9004e8 items=0 ppid=2141 pid=2278 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 11 00:47:23.035000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 11 00:47:23.035000 audit[2278]: AVC avc: denied { bpf } for pid=2278 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:23.035000 audit[2278]: AVC avc: denied { bpf } for pid=2278 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:23.035000 audit[2278]: AVC avc: denied { perfmon } for pid=2278 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:23.035000 audit[2278]: AVC avc: denied { perfmon } for pid=2278 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:23.035000 audit[2278]: AVC avc: denied { perfmon } for pid=2278 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:23.035000 audit[2278]: AVC avc: denied { perfmon } for pid=2278 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:23.035000 audit[2278]: AVC avc: denied { perfmon } for pid=2278 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:23.035000 audit[2278]: AVC avc: denied { bpf } for pid=2278 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:23.035000 audit[2278]: AVC avc: denied { bpf } for pid=2278 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:23.035000 audit: BPF prog-id=89 op=LOAD Jul 11 00:47:23.035000 audit[2278]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=ffffde9001c8 a2=40 a3=ffffde9001f8 items=0 ppid=2141 pid=2278 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 11 00:47:23.035000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 11 00:47:23.035000 audit: BPF prog-id=89 op=UNLOAD Jul 11 00:47:23.035000 audit[2278]: AVC avc: denied { bpf } for pid=2278 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:23.035000 audit[2278]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=0 a1=ffffde9001f0 a2=50 a3=0 items=0 ppid=2141 pid=2278 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 11 00:47:23.035000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 11 00:47:23.035000 audit[2278]: AVC avc: denied { bpf } for pid=2278 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:23.035000 audit[2278]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=0 a1=ffffde9001f0 a2=50 a3=0 items=0 ppid=2141 pid=2278 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 11 00:47:23.035000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 11 00:47:23.035000 audit[2278]: AVC avc: denied { bpf } for pid=2278 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:23.035000 audit[2278]: AVC avc: denied { bpf } for pid=2278 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:23.035000 audit[2278]: AVC avc: denied { bpf } for pid=2278 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:23.035000 audit[2278]: AVC avc: denied { perfmon } for pid=2278 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:23.035000 audit[2278]: AVC avc: denied { perfmon } for pid=2278 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:23.035000 audit[2278]: AVC avc: denied { perfmon } for pid=2278 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:23.035000 audit[2278]: AVC avc: denied { perfmon } for pid=2278 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:23.035000 audit[2278]: AVC avc: denied { perfmon } for pid=2278 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:23.035000 audit[2278]: AVC avc: denied { bpf } for pid=2278 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:23.035000 audit[2278]: AVC avc: denied { bpf } for pid=2278 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:23.035000 audit: BPF prog-id=90 op=LOAD Jul 11 00:47:23.035000 audit[2278]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=ffffde8ff958 a2=94 a3=2 items=0 ppid=2141 pid=2278 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 11 00:47:23.035000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 11 00:47:23.035000 audit: BPF prog-id=90 op=UNLOAD Jul 11 00:47:23.035000 audit[2278]: AVC avc: denied { bpf } for pid=2278 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:23.035000 audit[2278]: AVC avc: denied { bpf } for pid=2278 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:23.035000 audit[2278]: AVC avc: denied { bpf } for pid=2278 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:23.035000 audit[2278]: AVC avc: denied { perfmon } for pid=2278 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:23.035000 audit[2278]: AVC avc: denied { perfmon } for pid=2278 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:23.035000 audit[2278]: AVC avc: denied { perfmon } for pid=2278 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:23.035000 audit[2278]: AVC avc: denied { perfmon } for pid=2278 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:23.035000 audit[2278]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=ffffde8ffae8 a2=94 a3=30 items=0 ppid=2141 pid=2278 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 11 00:47:23.035000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 11 00:47:23.038000 audit[2282]: AVC avc: denied { bpf } for pid=2282 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:23.038000 audit[2282]: AVC avc: denied { bpf } for pid=2282 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:23.038000 audit[2282]: AVC avc: denied { perfmon } for pid=2282 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:23.038000 audit[2282]: AVC avc: denied { perfmon } for pid=2282 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:23.038000 audit[2282]: AVC avc: denied { perfmon } for pid=2282 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:23.038000 audit[2282]: AVC avc: denied { perfmon } for pid=2282 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:23.038000 audit[2282]: AVC avc: denied { perfmon } for pid=2282 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:23.038000 audit[2282]: AVC avc: denied { bpf } for pid=2282 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:23.038000 audit[2282]: AVC avc: denied { bpf } for pid=2282 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:23.038000 audit: BPF prog-id=92 op=LOAD Jul 11 00:47:23.038000 audit[2282]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffe74da5a8 a2=98 a3=ffffe74da598 items=0 ppid=2141 pid=2282 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 11 00:47:23.038000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 11 00:47:23.039000 audit: BPF prog-id=92 op=UNLOAD Jul 11 00:47:23.039000 audit[2282]: AVC avc: denied { bpf } for pid=2282 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:23.039000 audit[2282]: AVC avc: denied { bpf } for pid=2282 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:23.039000 audit[2282]: AVC avc: denied { perfmon } for pid=2282 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:23.039000 audit[2282]: AVC avc: denied { perfmon } for pid=2282 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:23.039000 audit[2282]: AVC avc: denied { perfmon } for pid=2282 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:23.039000 audit[2282]: AVC avc: denied { perfmon } for pid=2282 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:23.039000 audit[2282]: AVC avc: denied { perfmon } for pid=2282 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:23.039000 audit[2282]: AVC avc: denied { bpf } for pid=2282 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:23.039000 audit[2282]: AVC avc: denied { bpf } for pid=2282 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:23.039000 audit: BPF prog-id=93 op=LOAD Jul 11 00:47:23.039000 audit[2282]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=ffffe74da238 a2=74 a3=95 items=0 ppid=2141 pid=2282 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 11 00:47:23.039000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 11 00:47:23.039000 audit: BPF prog-id=93 op=UNLOAD Jul 11 00:47:23.039000 audit[2282]: AVC avc: denied { bpf } for pid=2282 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:23.039000 audit[2282]: AVC avc: denied { bpf } for pid=2282 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:23.039000 audit[2282]: AVC avc: denied { perfmon } for pid=2282 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:23.039000 audit[2282]: AVC avc: denied { perfmon } for pid=2282 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:23.039000 audit[2282]: AVC avc: denied { perfmon } for pid=2282 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:23.039000 audit[2282]: AVC avc: denied { perfmon } for pid=2282 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:23.039000 audit[2282]: AVC avc: denied { perfmon } for pid=2282 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:23.039000 audit[2282]: AVC avc: denied { bpf } for pid=2282 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:23.039000 audit[2282]: AVC avc: denied { bpf } for pid=2282 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:23.039000 audit: BPF prog-id=94 op=LOAD Jul 11 00:47:23.039000 audit[2282]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=ffffe74da298 a2=94 a3=2 items=0 ppid=2141 pid=2282 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 11 00:47:23.039000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 11 00:47:23.039000 audit: BPF prog-id=94 op=UNLOAD Jul 11 00:47:23.066722 kubelet[1454]: E0711 00:47:23.066680 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 11 00:47:23.124000 audit[2282]: AVC avc: denied { bpf } for pid=2282 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:23.124000 audit[2282]: AVC avc: denied { bpf } for pid=2282 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:23.124000 audit[2282]: AVC avc: denied { perfmon } for pid=2282 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:23.124000 audit[2282]: AVC avc: denied { perfmon } for pid=2282 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:23.124000 audit[2282]: AVC avc: denied { perfmon } for pid=2282 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:23.124000 audit[2282]: AVC avc: denied { perfmon } for pid=2282 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:23.124000 audit[2282]: AVC avc: denied { perfmon } for pid=2282 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:23.124000 audit[2282]: AVC avc: denied { bpf } for pid=2282 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:23.124000 audit[2282]: AVC avc: denied { bpf } for pid=2282 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:23.124000 audit: BPF prog-id=95 op=LOAD Jul 11 00:47:23.124000 audit[2282]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=ffffe74da258 a2=40 a3=ffffe74da288 items=0 ppid=2141 pid=2282 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 11 00:47:23.124000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 11 00:47:23.124000 audit: BPF prog-id=95 op=UNLOAD Jul 11 00:47:23.124000 audit[2282]: AVC avc: denied { perfmon } for pid=2282 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:23.124000 audit[2282]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=0 a1=ffffe74da370 a2=50 a3=0 items=0 ppid=2141 pid=2282 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 11 00:47:23.124000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 11 00:47:23.132000 audit[2282]: AVC avc: denied { bpf } for pid=2282 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:23.132000 audit[2282]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffe74da2c8 a2=28 a3=ffffe74da3f8 items=0 ppid=2141 pid=2282 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 11 00:47:23.132000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 11 00:47:23.132000 audit[2282]: AVC avc: denied { bpf } for pid=2282 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:23.132000 audit[2282]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffe74da2f8 a2=28 a3=ffffe74da428 items=0 ppid=2141 pid=2282 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 11 00:47:23.132000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 11 00:47:23.132000 audit[2282]: AVC avc: denied { bpf } for pid=2282 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:23.132000 audit[2282]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffe74da1a8 a2=28 a3=ffffe74da2d8 items=0 ppid=2141 pid=2282 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 11 00:47:23.132000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 11 00:47:23.132000 audit[2282]: AVC avc: denied { bpf } for pid=2282 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:23.132000 audit[2282]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffe74da318 a2=28 a3=ffffe74da448 items=0 ppid=2141 pid=2282 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 11 00:47:23.132000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 11 00:47:23.132000 audit[2282]: AVC avc: denied { bpf } for pid=2282 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:23.132000 audit[2282]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffe74da2f8 a2=28 a3=ffffe74da428 items=0 ppid=2141 pid=2282 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 11 00:47:23.132000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 11 00:47:23.132000 audit[2282]: AVC avc: denied { bpf } for pid=2282 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:23.132000 audit[2282]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffe74da2e8 a2=28 a3=ffffe74da418 items=0 ppid=2141 pid=2282 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 11 00:47:23.132000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 11 00:47:23.132000 audit[2282]: AVC avc: denied { bpf } for pid=2282 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:23.132000 audit[2282]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffe74da318 a2=28 a3=ffffe74da448 items=0 ppid=2141 pid=2282 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 11 00:47:23.132000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 11 00:47:23.132000 audit[2282]: AVC avc: denied { bpf } for pid=2282 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:23.132000 audit[2282]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffe74da2f8 a2=28 a3=ffffe74da428 items=0 ppid=2141 pid=2282 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 11 00:47:23.132000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 11 00:47:23.132000 audit[2282]: AVC avc: denied { bpf } for pid=2282 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:23.132000 audit[2282]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffe74da318 a2=28 a3=ffffe74da448 items=0 ppid=2141 pid=2282 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 11 00:47:23.132000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 11 00:47:23.132000 audit[2282]: AVC avc: denied { bpf } for pid=2282 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:23.132000 audit[2282]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffe74da2e8 a2=28 a3=ffffe74da418 items=0 ppid=2141 pid=2282 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 11 00:47:23.132000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 11 00:47:23.132000 audit[2282]: AVC avc: denied { bpf } for pid=2282 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:23.132000 audit[2282]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffe74da368 a2=28 a3=ffffe74da4a8 items=0 ppid=2141 pid=2282 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 11 00:47:23.132000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 11 00:47:23.132000 audit[2282]: AVC avc: denied { perfmon } for pid=2282 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:23.132000 audit[2282]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=0 a1=ffffe74da0a0 a2=50 a3=0 items=0 ppid=2141 pid=2282 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 11 00:47:23.132000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 11 00:47:23.132000 audit[2282]: AVC avc: denied { bpf } for pid=2282 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:23.132000 audit[2282]: AVC avc: denied { bpf } for pid=2282 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:23.132000 audit[2282]: AVC avc: denied { perfmon } for pid=2282 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:23.132000 audit[2282]: AVC avc: denied { perfmon } for pid=2282 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:23.132000 audit[2282]: AVC avc: denied { perfmon } for pid=2282 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:23.132000 audit[2282]: AVC avc: denied { perfmon } for pid=2282 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:23.132000 audit[2282]: AVC avc: denied { perfmon } for pid=2282 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:23.132000 audit[2282]: AVC avc: denied { bpf } for pid=2282 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:23.132000 audit[2282]: AVC avc: denied { bpf } for pid=2282 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:23.132000 audit: BPF prog-id=96 op=LOAD Jul 11 00:47:23.132000 audit[2282]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=ffffe74da0a8 a2=94 a3=5 items=0 ppid=2141 pid=2282 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 11 00:47:23.132000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 11 00:47:23.132000 audit: BPF prog-id=96 op=UNLOAD Jul 11 00:47:23.132000 audit[2282]: AVC avc: denied { perfmon } for pid=2282 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:23.132000 audit[2282]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=0 a1=ffffe74da1b0 a2=50 a3=0 items=0 ppid=2141 pid=2282 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 11 00:47:23.132000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 11 00:47:23.132000 audit[2282]: AVC avc: denied { bpf } for pid=2282 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:23.132000 audit[2282]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=16 a1=ffffe74da2f8 a2=4 a3=3 items=0 ppid=2141 pid=2282 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 11 00:47:23.132000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 11 00:47:23.132000 audit[2282]: AVC avc: denied { bpf } for pid=2282 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:23.132000 audit[2282]: AVC avc: denied { bpf } for pid=2282 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:23.132000 audit[2282]: AVC avc: denied { perfmon } for pid=2282 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:23.132000 audit[2282]: AVC avc: denied { bpf } for pid=2282 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:23.132000 audit[2282]: AVC avc: denied { perfmon } for pid=2282 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:23.132000 audit[2282]: AVC avc: denied { perfmon } for pid=2282 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:23.132000 audit[2282]: AVC avc: denied { perfmon } for pid=2282 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:23.132000 audit[2282]: AVC avc: denied { perfmon } for pid=2282 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:23.132000 audit[2282]: AVC avc: denied { perfmon } for pid=2282 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:23.132000 audit[2282]: AVC avc: denied { bpf } for pid=2282 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:23.132000 audit[2282]: AVC avc: denied { confidentiality } for pid=2282 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 11 00:47:23.132000 audit[2282]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=ffffe74da2d8 a2=94 a3=6 items=0 ppid=2141 pid=2282 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 11 00:47:23.132000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 11 00:47:23.133000 audit[2282]: AVC avc: denied { bpf } for pid=2282 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:23.133000 audit[2282]: AVC avc: denied { bpf } for pid=2282 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:23.133000 audit[2282]: AVC avc: denied { perfmon } for pid=2282 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:23.133000 audit[2282]: AVC avc: denied { bpf } for pid=2282 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:23.133000 audit[2282]: AVC avc: denied { perfmon } for pid=2282 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:23.133000 audit[2282]: AVC avc: denied { perfmon } for pid=2282 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:23.133000 audit[2282]: AVC avc: denied { perfmon } for pid=2282 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:23.133000 audit[2282]: AVC avc: denied { perfmon } for pid=2282 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:23.133000 audit[2282]: AVC avc: denied { perfmon } for pid=2282 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:23.133000 audit[2282]: AVC avc: denied { bpf } for pid=2282 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:23.133000 audit[2282]: AVC avc: denied { confidentiality } for pid=2282 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 11 00:47:23.133000 audit[2282]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=ffffe74d9aa8 a2=94 a3=83 items=0 ppid=2141 pid=2282 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 11 00:47:23.133000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 11 00:47:23.133000 audit[2282]: AVC avc: denied { bpf } for pid=2282 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:23.133000 audit[2282]: AVC avc: denied { bpf } for pid=2282 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:23.133000 audit[2282]: AVC avc: denied { perfmon } for pid=2282 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:23.133000 audit[2282]: AVC avc: denied { bpf } for pid=2282 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:23.133000 audit[2282]: AVC avc: denied { perfmon } for pid=2282 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:23.133000 audit[2282]: AVC avc: denied { perfmon } for pid=2282 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:23.133000 audit[2282]: AVC avc: denied { perfmon } for pid=2282 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:23.133000 audit[2282]: AVC avc: denied { perfmon } for pid=2282 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:23.133000 audit[2282]: AVC avc: denied { perfmon } for pid=2282 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:23.133000 audit[2282]: AVC avc: denied { bpf } for pid=2282 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:23.133000 audit[2282]: AVC avc: denied { confidentiality } for pid=2282 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 11 00:47:23.133000 audit[2282]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=ffffe74d9aa8 a2=94 a3=83 items=0 ppid=2141 pid=2282 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 11 00:47:23.133000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 11 00:47:23.133000 audit[2282]: AVC avc: denied { bpf } for pid=2282 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:23.133000 audit[2282]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffe74db4e8 a2=10 a3=ffffe74db5d8 items=0 ppid=2141 pid=2282 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 11 00:47:23.133000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 11 00:47:23.133000 audit[2282]: AVC avc: denied { bpf } for pid=2282 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:23.133000 audit[2282]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffe74db3a8 a2=10 a3=ffffe74db498 items=0 ppid=2141 pid=2282 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 11 00:47:23.133000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 11 00:47:23.133000 audit[2282]: AVC avc: denied { bpf } for pid=2282 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:23.133000 audit[2282]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffe74db318 a2=10 a3=ffffe74db498 items=0 ppid=2141 pid=2282 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 11 00:47:23.133000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 11 00:47:23.133000 audit[2282]: AVC avc: denied { bpf } for pid=2282 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:23.133000 audit[2282]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffe74db318 a2=10 a3=ffffe74db498 items=0 ppid=2141 pid=2282 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 11 00:47:23.133000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 11 00:47:23.143000 audit: BPF prog-id=91 op=UNLOAD Jul 11 00:47:23.191000 audit[2310]: NETFILTER_CFG table=mangle:77 family=2 entries=16 op=nft_register_chain pid=2310 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 11 00:47:23.191000 audit[2310]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6868 a0=3 a1=ffffc26eb7a0 a2=0 a3=ffffa307efa8 items=0 ppid=2141 pid=2310 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 11 00:47:23.191000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 11 00:47:23.200000 audit[2312]: NETFILTER_CFG table=nat:78 family=2 entries=15 op=nft_register_chain pid=2312 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 11 00:47:23.200000 audit[2312]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5084 a0=3 a1=ffffdb698950 a2=0 a3=ffff9bc0cfa8 items=0 ppid=2141 pid=2312 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 11 00:47:23.200000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 11 00:47:23.202000 audit[2313]: NETFILTER_CFG table=filter:79 family=2 entries=39 op=nft_register_chain pid=2313 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 11 00:47:23.202000 audit[2313]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=18968 a0=3 a1=ffffe82e5b40 a2=0 a3=ffffa0f69fa8 items=0 ppid=2141 pid=2313 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 11 00:47:23.202000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 11 00:47:23.203000 audit[2309]: NETFILTER_CFG table=raw:80 family=2 entries=21 op=nft_register_chain pid=2309 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 11 00:47:23.203000 audit[2309]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=8452 a0=3 a1=ffffc02d8c20 a2=0 a3=ffffba250fa8 items=0 ppid=2141 pid=2309 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 11 00:47:23.203000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 11 00:47:23.292116 kubelet[1454]: I0711 00:47:23.292070 1454 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Jul 11 00:47:24.066943 kubelet[1454]: E0711 00:47:24.066896 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 11 00:47:25.067670 kubelet[1454]: E0711 00:47:25.067623 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 11 00:47:25.068255 systemd-networkd[1057]: vxlan.calico: Gained IPv6LL Jul 11 00:47:26.068451 kubelet[1454]: E0711 00:47:26.068389 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 11 00:47:27.068850 kubelet[1454]: E0711 00:47:27.068797 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 11 00:47:28.057036 kubelet[1454]: E0711 00:47:28.056988 1454 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 11 00:47:28.069742 kubelet[1454]: E0711 00:47:28.069721 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 11 00:47:29.070032 kubelet[1454]: E0711 00:47:29.069988 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 11 00:47:29.452670 kubelet[1454]: I0711 00:47:29.452586 1454 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Jul 11 00:47:29.539720 systemd[1]: run-containerd-runc-k8s.io-7d3efa61e58eb085bbd887f9918cb640b5c6f4b0ad76d0b7481c6a55f227417e-runc.qxsd42.mount: Deactivated successfully. Jul 11 00:47:30.070298 kubelet[1454]: E0711 00:47:30.070232 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 11 00:47:31.070559 kubelet[1454]: E0711 00:47:31.070523 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 11 00:47:31.252768 env[1214]: time="2025-07-11T00:47:31.252723120Z" level=info msg="StopPodSandbox for \"e6d60429c722ea86d4e9249eb32818ac7b392673244cf67e42f416cd57292a83\"" Jul 11 00:47:31.363961 env[1214]: 2025-07-11 00:47:31.294 [INFO][2387] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="e6d60429c722ea86d4e9249eb32818ac7b392673244cf67e42f416cd57292a83" Jul 11 00:47:31.363961 env[1214]: 2025-07-11 00:47:31.294 [INFO][2387] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="e6d60429c722ea86d4e9249eb32818ac7b392673244cf67e42f416cd57292a83" iface="eth0" netns="/var/run/netns/cni-5cf25df2-b3b2-1bd8-f2c9-16be587497df" Jul 11 00:47:31.363961 env[1214]: 2025-07-11 00:47:31.294 [INFO][2387] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="e6d60429c722ea86d4e9249eb32818ac7b392673244cf67e42f416cd57292a83" iface="eth0" netns="/var/run/netns/cni-5cf25df2-b3b2-1bd8-f2c9-16be587497df" Jul 11 00:47:31.363961 env[1214]: 2025-07-11 00:47:31.294 [INFO][2387] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="e6d60429c722ea86d4e9249eb32818ac7b392673244cf67e42f416cd57292a83" iface="eth0" netns="/var/run/netns/cni-5cf25df2-b3b2-1bd8-f2c9-16be587497df" Jul 11 00:47:31.363961 env[1214]: 2025-07-11 00:47:31.294 [INFO][2387] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="e6d60429c722ea86d4e9249eb32818ac7b392673244cf67e42f416cd57292a83" Jul 11 00:47:31.363961 env[1214]: 2025-07-11 00:47:31.294 [INFO][2387] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="e6d60429c722ea86d4e9249eb32818ac7b392673244cf67e42f416cd57292a83" Jul 11 00:47:31.363961 env[1214]: 2025-07-11 00:47:31.349 [INFO][2396] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="e6d60429c722ea86d4e9249eb32818ac7b392673244cf67e42f416cd57292a83" HandleID="k8s-pod-network.e6d60429c722ea86d4e9249eb32818ac7b392673244cf67e42f416cd57292a83" Workload="10.0.0.4-k8s-nginx--deployment--7fcdb87857--gnckl-eth0" Jul 11 00:47:31.363961 env[1214]: 2025-07-11 00:47:31.349 [INFO][2396] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Jul 11 00:47:31.363961 env[1214]: 2025-07-11 00:47:31.349 [INFO][2396] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Jul 11 00:47:31.363961 env[1214]: 2025-07-11 00:47:31.358 [WARNING][2396] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="e6d60429c722ea86d4e9249eb32818ac7b392673244cf67e42f416cd57292a83" HandleID="k8s-pod-network.e6d60429c722ea86d4e9249eb32818ac7b392673244cf67e42f416cd57292a83" Workload="10.0.0.4-k8s-nginx--deployment--7fcdb87857--gnckl-eth0" Jul 11 00:47:31.363961 env[1214]: 2025-07-11 00:47:31.358 [INFO][2396] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="e6d60429c722ea86d4e9249eb32818ac7b392673244cf67e42f416cd57292a83" HandleID="k8s-pod-network.e6d60429c722ea86d4e9249eb32818ac7b392673244cf67e42f416cd57292a83" Workload="10.0.0.4-k8s-nginx--deployment--7fcdb87857--gnckl-eth0" Jul 11 00:47:31.363961 env[1214]: 2025-07-11 00:47:31.360 [INFO][2396] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Jul 11 00:47:31.363961 env[1214]: 2025-07-11 00:47:31.362 [INFO][2387] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="e6d60429c722ea86d4e9249eb32818ac7b392673244cf67e42f416cd57292a83" Jul 11 00:47:31.365504 env[1214]: time="2025-07-11T00:47:31.364073349Z" level=info msg="TearDown network for sandbox \"e6d60429c722ea86d4e9249eb32818ac7b392673244cf67e42f416cd57292a83\" successfully" Jul 11 00:47:31.365504 env[1214]: time="2025-07-11T00:47:31.364119932Z" level=info msg="StopPodSandbox for \"e6d60429c722ea86d4e9249eb32818ac7b392673244cf67e42f416cd57292a83\" returns successfully" Jul 11 00:47:31.365504 env[1214]: time="2025-07-11T00:47:31.364688730Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-7fcdb87857-gnckl,Uid:049937f9-c2a0-42f2-a17a-1e254bfc7804,Namespace:default,Attempt:1,}" Jul 11 00:47:31.365439 systemd[1]: run-netns-cni\x2d5cf25df2\x2db3b2\x2d1bd8\x2df2c9\x2d16be587497df.mount: Deactivated successfully. Jul 11 00:47:31.472081 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Jul 11 00:47:31.472216 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): caliab859cb9d6d: link becomes ready Jul 11 00:47:31.472465 systemd-networkd[1057]: caliab859cb9d6d: Link UP Jul 11 00:47:31.472611 systemd-networkd[1057]: caliab859cb9d6d: Gained carrier Jul 11 00:47:31.483182 env[1214]: 2025-07-11 00:47:31.410 [INFO][2405] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.0.0.4-k8s-nginx--deployment--7fcdb87857--gnckl-eth0 nginx-deployment-7fcdb87857- default 049937f9-c2a0-42f2-a17a-1e254bfc7804 1224 0 2025-07-11 00:47:19 +0000 UTC map[app:nginx pod-template-hash:7fcdb87857 projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 10.0.0.4 nginx-deployment-7fcdb87857-gnckl eth0 default [] [] [kns.default ksa.default.default] caliab859cb9d6d [] [] }} ContainerID="7821d3a048c85ce6895da578777586a645e16c37a1232734c59f8b211da71071" Namespace="default" Pod="nginx-deployment-7fcdb87857-gnckl" WorkloadEndpoint="10.0.0.4-k8s-nginx--deployment--7fcdb87857--gnckl-" Jul 11 00:47:31.483182 env[1214]: 2025-07-11 00:47:31.410 [INFO][2405] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="7821d3a048c85ce6895da578777586a645e16c37a1232734c59f8b211da71071" Namespace="default" Pod="nginx-deployment-7fcdb87857-gnckl" WorkloadEndpoint="10.0.0.4-k8s-nginx--deployment--7fcdb87857--gnckl-eth0" Jul 11 00:47:31.483182 env[1214]: 2025-07-11 00:47:31.432 [INFO][2419] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="7821d3a048c85ce6895da578777586a645e16c37a1232734c59f8b211da71071" HandleID="k8s-pod-network.7821d3a048c85ce6895da578777586a645e16c37a1232734c59f8b211da71071" Workload="10.0.0.4-k8s-nginx--deployment--7fcdb87857--gnckl-eth0" Jul 11 00:47:31.483182 env[1214]: 2025-07-11 00:47:31.433 [INFO][2419] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="7821d3a048c85ce6895da578777586a645e16c37a1232734c59f8b211da71071" HandleID="k8s-pod-network.7821d3a048c85ce6895da578777586a645e16c37a1232734c59f8b211da71071" Workload="10.0.0.4-k8s-nginx--deployment--7fcdb87857--gnckl-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x4000137450), Attrs:map[string]string{"namespace":"default", "node":"10.0.0.4", "pod":"nginx-deployment-7fcdb87857-gnckl", "timestamp":"2025-07-11 00:47:31.432945074 +0000 UTC"}, Hostname:"10.0.0.4", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Jul 11 00:47:31.483182 env[1214]: 2025-07-11 00:47:31.433 [INFO][2419] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Jul 11 00:47:31.483182 env[1214]: 2025-07-11 00:47:31.433 [INFO][2419] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Jul 11 00:47:31.483182 env[1214]: 2025-07-11 00:47:31.433 [INFO][2419] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.0.0.4' Jul 11 00:47:31.483182 env[1214]: 2025-07-11 00:47:31.443 [INFO][2419] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.7821d3a048c85ce6895da578777586a645e16c37a1232734c59f8b211da71071" host="10.0.0.4" Jul 11 00:47:31.483182 env[1214]: 2025-07-11 00:47:31.448 [INFO][2419] ipam/ipam.go 394: Looking up existing affinities for host host="10.0.0.4" Jul 11 00:47:31.483182 env[1214]: 2025-07-11 00:47:31.453 [INFO][2419] ipam/ipam.go 511: Trying affinity for 192.168.99.192/26 host="10.0.0.4" Jul 11 00:47:31.483182 env[1214]: 2025-07-11 00:47:31.455 [INFO][2419] ipam/ipam.go 158: Attempting to load block cidr=192.168.99.192/26 host="10.0.0.4" Jul 11 00:47:31.483182 env[1214]: 2025-07-11 00:47:31.457 [INFO][2419] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.99.192/26 host="10.0.0.4" Jul 11 00:47:31.483182 env[1214]: 2025-07-11 00:47:31.457 [INFO][2419] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.99.192/26 handle="k8s-pod-network.7821d3a048c85ce6895da578777586a645e16c37a1232734c59f8b211da71071" host="10.0.0.4" Jul 11 00:47:31.483182 env[1214]: 2025-07-11 00:47:31.458 [INFO][2419] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.7821d3a048c85ce6895da578777586a645e16c37a1232734c59f8b211da71071 Jul 11 00:47:31.483182 env[1214]: 2025-07-11 00:47:31.462 [INFO][2419] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.99.192/26 handle="k8s-pod-network.7821d3a048c85ce6895da578777586a645e16c37a1232734c59f8b211da71071" host="10.0.0.4" Jul 11 00:47:31.483182 env[1214]: 2025-07-11 00:47:31.466 [INFO][2419] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.99.193/26] block=192.168.99.192/26 handle="k8s-pod-network.7821d3a048c85ce6895da578777586a645e16c37a1232734c59f8b211da71071" host="10.0.0.4" Jul 11 00:47:31.483182 env[1214]: 2025-07-11 00:47:31.467 [INFO][2419] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.99.193/26] handle="k8s-pod-network.7821d3a048c85ce6895da578777586a645e16c37a1232734c59f8b211da71071" host="10.0.0.4" Jul 11 00:47:31.483182 env[1214]: 2025-07-11 00:47:31.467 [INFO][2419] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Jul 11 00:47:31.483182 env[1214]: 2025-07-11 00:47:31.467 [INFO][2419] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.99.193/26] IPv6=[] ContainerID="7821d3a048c85ce6895da578777586a645e16c37a1232734c59f8b211da71071" HandleID="k8s-pod-network.7821d3a048c85ce6895da578777586a645e16c37a1232734c59f8b211da71071" Workload="10.0.0.4-k8s-nginx--deployment--7fcdb87857--gnckl-eth0" Jul 11 00:47:31.483706 env[1214]: 2025-07-11 00:47:31.468 [INFO][2405] cni-plugin/k8s.go 418: Populated endpoint ContainerID="7821d3a048c85ce6895da578777586a645e16c37a1232734c59f8b211da71071" Namespace="default" Pod="nginx-deployment-7fcdb87857-gnckl" WorkloadEndpoint="10.0.0.4-k8s-nginx--deployment--7fcdb87857--gnckl-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.4-k8s-nginx--deployment--7fcdb87857--gnckl-eth0", GenerateName:"nginx-deployment-7fcdb87857-", Namespace:"default", SelfLink:"", UID:"049937f9-c2a0-42f2-a17a-1e254bfc7804", ResourceVersion:"1224", Generation:0, CreationTimestamp:time.Date(2025, time.July, 11, 0, 47, 19, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"7fcdb87857", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.4", ContainerID:"", Pod:"nginx-deployment-7fcdb87857-gnckl", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.99.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"caliab859cb9d6d", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Jul 11 00:47:31.483706 env[1214]: 2025-07-11 00:47:31.468 [INFO][2405] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.99.193/32] ContainerID="7821d3a048c85ce6895da578777586a645e16c37a1232734c59f8b211da71071" Namespace="default" Pod="nginx-deployment-7fcdb87857-gnckl" WorkloadEndpoint="10.0.0.4-k8s-nginx--deployment--7fcdb87857--gnckl-eth0" Jul 11 00:47:31.483706 env[1214]: 2025-07-11 00:47:31.469 [INFO][2405] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to caliab859cb9d6d ContainerID="7821d3a048c85ce6895da578777586a645e16c37a1232734c59f8b211da71071" Namespace="default" Pod="nginx-deployment-7fcdb87857-gnckl" WorkloadEndpoint="10.0.0.4-k8s-nginx--deployment--7fcdb87857--gnckl-eth0" Jul 11 00:47:31.483706 env[1214]: 2025-07-11 00:47:31.472 [INFO][2405] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="7821d3a048c85ce6895da578777586a645e16c37a1232734c59f8b211da71071" Namespace="default" Pod="nginx-deployment-7fcdb87857-gnckl" WorkloadEndpoint="10.0.0.4-k8s-nginx--deployment--7fcdb87857--gnckl-eth0" Jul 11 00:47:31.483706 env[1214]: 2025-07-11 00:47:31.473 [INFO][2405] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="7821d3a048c85ce6895da578777586a645e16c37a1232734c59f8b211da71071" Namespace="default" Pod="nginx-deployment-7fcdb87857-gnckl" WorkloadEndpoint="10.0.0.4-k8s-nginx--deployment--7fcdb87857--gnckl-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.4-k8s-nginx--deployment--7fcdb87857--gnckl-eth0", GenerateName:"nginx-deployment-7fcdb87857-", Namespace:"default", SelfLink:"", UID:"049937f9-c2a0-42f2-a17a-1e254bfc7804", ResourceVersion:"1224", Generation:0, CreationTimestamp:time.Date(2025, time.July, 11, 0, 47, 19, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"7fcdb87857", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.4", ContainerID:"7821d3a048c85ce6895da578777586a645e16c37a1232734c59f8b211da71071", Pod:"nginx-deployment-7fcdb87857-gnckl", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.99.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"caliab859cb9d6d", MAC:"72:44:6e:04:f9:9f", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Jul 11 00:47:31.483706 env[1214]: 2025-07-11 00:47:31.481 [INFO][2405] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="7821d3a048c85ce6895da578777586a645e16c37a1232734c59f8b211da71071" Namespace="default" Pod="nginx-deployment-7fcdb87857-gnckl" WorkloadEndpoint="10.0.0.4-k8s-nginx--deployment--7fcdb87857--gnckl-eth0" Jul 11 00:47:31.492912 env[1214]: time="2025-07-11T00:47:31.492854543Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 11 00:47:31.493054 env[1214]: time="2025-07-11T00:47:31.493029841Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 11 00:47:31.493282 env[1214]: time="2025-07-11T00:47:31.493164233Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 11 00:47:31.493451 env[1214]: time="2025-07-11T00:47:31.493387074Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/7821d3a048c85ce6895da578777586a645e16c37a1232734c59f8b211da71071 pid=2447 runtime=io.containerd.runc.v2 Jul 11 00:47:31.505787 systemd[1]: Started cri-containerd-7821d3a048c85ce6895da578777586a645e16c37a1232734c59f8b211da71071.scope. Jul 11 00:47:31.513482 kernel: kauditd_printk_skb: 563 callbacks suppressed Jul 11 00:47:31.513566 kernel: audit: type=1325 audit(1752194851.492:654): table=filter:81 family=2 entries=38 op=nft_register_chain pid=2438 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 11 00:47:31.492000 audit[2438]: NETFILTER_CFG table=filter:81 family=2 entries=38 op=nft_register_chain pid=2438 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 11 00:47:31.492000 audit[2438]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=21324 a0=3 a1=ffffd850a250 a2=0 a3=ffffb57a5fa8 items=0 ppid=2141 pid=2438 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 11 00:47:31.518740 kernel: audit: type=1300 audit(1752194851.492:654): arch=c00000b7 syscall=211 success=yes exit=21324 a0=3 a1=ffffd850a250 a2=0 a3=ffffb57a5fa8 items=0 ppid=2141 pid=2438 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 11 00:47:31.518809 kernel: audit: type=1327 audit(1752194851.492:654): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 11 00:47:31.492000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 11 00:47:31.521000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:31.521000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:31.528496 kernel: audit: type=1400 audit(1752194851.521:655): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:31.528729 kernel: audit: type=1400 audit(1752194851.521:656): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:31.528755 kernel: audit: type=1400 audit(1752194851.521:657): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:31.521000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:31.521000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:31.530846 systemd-resolved[1156]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Jul 11 00:47:31.533296 kernel: audit: type=1400 audit(1752194851.521:658): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:31.521000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:31.538469 kernel: audit: type=1400 audit(1752194851.521:659): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:31.538530 kernel: audit: type=1400 audit(1752194851.521:660): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:31.538560 kernel: audit: type=1400 audit(1752194851.521:661): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:31.521000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:31.521000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:31.521000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:31.521000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:31.521000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:31.521000 audit: BPF prog-id=97 op=LOAD Jul 11 00:47:31.522000 audit[2456]: AVC avc: denied { bpf } for pid=2456 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:31.522000 audit[2456]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=2447 pid=2456 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 11 00:47:31.522000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3738323164336130343863383563653638393564613537383737373538 Jul 11 00:47:31.522000 audit[2456]: AVC avc: denied { perfmon } for pid=2456 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:31.522000 audit[2456]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2447 pid=2456 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 11 00:47:31.522000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3738323164336130343863383563653638393564613537383737373538 Jul 11 00:47:31.522000 audit[2456]: AVC avc: denied { bpf } for pid=2456 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:31.522000 audit[2456]: AVC avc: denied { bpf } for pid=2456 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:31.522000 audit[2456]: AVC avc: denied { bpf } for pid=2456 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:31.522000 audit[2456]: AVC avc: denied { perfmon } for pid=2456 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:31.522000 audit[2456]: AVC avc: denied { perfmon } for pid=2456 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:31.522000 audit[2456]: AVC avc: denied { perfmon } for pid=2456 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:31.522000 audit[2456]: AVC avc: denied { perfmon } for pid=2456 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:31.522000 audit[2456]: AVC avc: denied { perfmon } for pid=2456 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:31.522000 audit[2456]: AVC avc: denied { bpf } for pid=2456 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:31.522000 audit[2456]: AVC avc: denied { bpf } for pid=2456 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:31.522000 audit: BPF prog-id=98 op=LOAD Jul 11 00:47:31.522000 audit[2456]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2447 pid=2456 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 11 00:47:31.522000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3738323164336130343863383563653638393564613537383737373538 Jul 11 00:47:31.522000 audit[2456]: AVC avc: denied { bpf } for pid=2456 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:31.522000 audit[2456]: AVC avc: denied { bpf } for pid=2456 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:31.522000 audit[2456]: AVC avc: denied { perfmon } for pid=2456 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:31.522000 audit[2456]: AVC avc: denied { perfmon } for pid=2456 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:31.522000 audit[2456]: AVC avc: denied { perfmon } for pid=2456 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:31.522000 audit[2456]: AVC avc: denied { perfmon } for pid=2456 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:31.522000 audit[2456]: AVC avc: denied { perfmon } for pid=2456 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:31.522000 audit[2456]: AVC avc: denied { bpf } for pid=2456 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:31.522000 audit[2456]: AVC avc: denied { bpf } for pid=2456 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:31.522000 audit: BPF prog-id=99 op=LOAD Jul 11 00:47:31.522000 audit[2456]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2447 pid=2456 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 11 00:47:31.522000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3738323164336130343863383563653638393564613537383737373538 Jul 11 00:47:31.522000 audit: BPF prog-id=99 op=UNLOAD Jul 11 00:47:31.522000 audit: BPF prog-id=98 op=UNLOAD Jul 11 00:47:31.522000 audit[2456]: AVC avc: denied { bpf } for pid=2456 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:31.522000 audit[2456]: AVC avc: denied { bpf } for pid=2456 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:31.522000 audit[2456]: AVC avc: denied { bpf } for pid=2456 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:31.522000 audit[2456]: AVC avc: denied { perfmon } for pid=2456 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:31.522000 audit[2456]: AVC avc: denied { perfmon } for pid=2456 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:31.522000 audit[2456]: AVC avc: denied { perfmon } for pid=2456 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:31.522000 audit[2456]: AVC avc: denied { perfmon } for pid=2456 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:31.522000 audit[2456]: AVC avc: denied { perfmon } for pid=2456 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:31.522000 audit[2456]: AVC avc: denied { bpf } for pid=2456 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:31.522000 audit[2456]: AVC avc: denied { bpf } for pid=2456 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:31.522000 audit: BPF prog-id=100 op=LOAD Jul 11 00:47:31.522000 audit[2456]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2447 pid=2456 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 11 00:47:31.522000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3738323164336130343863383563653638393564613537383737373538 Jul 11 00:47:31.551831 env[1214]: time="2025-07-11T00:47:31.551774804Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-7fcdb87857-gnckl,Uid:049937f9-c2a0-42f2-a17a-1e254bfc7804,Namespace:default,Attempt:1,} returns sandbox id \"7821d3a048c85ce6895da578777586a645e16c37a1232734c59f8b211da71071\"" Jul 11 00:47:31.553273 env[1214]: time="2025-07-11T00:47:31.553219451Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" Jul 11 00:47:32.070688 kubelet[1454]: E0711 00:47:32.070655 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 11 00:47:32.252418 env[1214]: time="2025-07-11T00:47:32.252365310Z" level=info msg="StopPodSandbox for \"0a0033d58523f38c27965cb412490432d79182bff20f283e23a37a6bd9145483\"" Jul 11 00:47:32.327960 env[1214]: 2025-07-11 00:47:32.293 [INFO][2497] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="0a0033d58523f38c27965cb412490432d79182bff20f283e23a37a6bd9145483" Jul 11 00:47:32.327960 env[1214]: 2025-07-11 00:47:32.293 [INFO][2497] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="0a0033d58523f38c27965cb412490432d79182bff20f283e23a37a6bd9145483" iface="eth0" netns="/var/run/netns/cni-e48071b4-ac1d-e24b-2f0f-7fe5ee064d73" Jul 11 00:47:32.327960 env[1214]: 2025-07-11 00:47:32.293 [INFO][2497] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="0a0033d58523f38c27965cb412490432d79182bff20f283e23a37a6bd9145483" iface="eth0" netns="/var/run/netns/cni-e48071b4-ac1d-e24b-2f0f-7fe5ee064d73" Jul 11 00:47:32.327960 env[1214]: 2025-07-11 00:47:32.293 [INFO][2497] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="0a0033d58523f38c27965cb412490432d79182bff20f283e23a37a6bd9145483" iface="eth0" netns="/var/run/netns/cni-e48071b4-ac1d-e24b-2f0f-7fe5ee064d73" Jul 11 00:47:32.327960 env[1214]: 2025-07-11 00:47:32.293 [INFO][2497] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="0a0033d58523f38c27965cb412490432d79182bff20f283e23a37a6bd9145483" Jul 11 00:47:32.327960 env[1214]: 2025-07-11 00:47:32.293 [INFO][2497] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="0a0033d58523f38c27965cb412490432d79182bff20f283e23a37a6bd9145483" Jul 11 00:47:32.327960 env[1214]: 2025-07-11 00:47:32.314 [INFO][2506] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="0a0033d58523f38c27965cb412490432d79182bff20f283e23a37a6bd9145483" HandleID="k8s-pod-network.0a0033d58523f38c27965cb412490432d79182bff20f283e23a37a6bd9145483" Workload="10.0.0.4-k8s-csi--node--driver--nmdwm-eth0" Jul 11 00:47:32.327960 env[1214]: 2025-07-11 00:47:32.314 [INFO][2506] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Jul 11 00:47:32.327960 env[1214]: 2025-07-11 00:47:32.314 [INFO][2506] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Jul 11 00:47:32.327960 env[1214]: 2025-07-11 00:47:32.322 [WARNING][2506] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="0a0033d58523f38c27965cb412490432d79182bff20f283e23a37a6bd9145483" HandleID="k8s-pod-network.0a0033d58523f38c27965cb412490432d79182bff20f283e23a37a6bd9145483" Workload="10.0.0.4-k8s-csi--node--driver--nmdwm-eth0" Jul 11 00:47:32.327960 env[1214]: 2025-07-11 00:47:32.322 [INFO][2506] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="0a0033d58523f38c27965cb412490432d79182bff20f283e23a37a6bd9145483" HandleID="k8s-pod-network.0a0033d58523f38c27965cb412490432d79182bff20f283e23a37a6bd9145483" Workload="10.0.0.4-k8s-csi--node--driver--nmdwm-eth0" Jul 11 00:47:32.327960 env[1214]: 2025-07-11 00:47:32.323 [INFO][2506] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Jul 11 00:47:32.327960 env[1214]: 2025-07-11 00:47:32.326 [INFO][2497] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="0a0033d58523f38c27965cb412490432d79182bff20f283e23a37a6bd9145483" Jul 11 00:47:32.327960 env[1214]: time="2025-07-11T00:47:32.327924216Z" level=info msg="TearDown network for sandbox \"0a0033d58523f38c27965cb412490432d79182bff20f283e23a37a6bd9145483\" successfully" Jul 11 00:47:32.328527 env[1214]: time="2025-07-11T00:47:32.327957806Z" level=info msg="StopPodSandbox for \"0a0033d58523f38c27965cb412490432d79182bff20f283e23a37a6bd9145483\" returns successfully" Jul 11 00:47:32.328742 env[1214]: time="2025-07-11T00:47:32.328712091Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-nmdwm,Uid:52e0b70b-1770-423a-bbff-f30656e42551,Namespace:calico-system,Attempt:1,}" Jul 11 00:47:32.366279 systemd[1]: run-containerd-runc-k8s.io-7821d3a048c85ce6895da578777586a645e16c37a1232734c59f8b211da71071-runc.bKCvYz.mount: Deactivated successfully. Jul 11 00:47:32.366368 systemd[1]: run-netns-cni\x2de48071b4\x2dac1d\x2de24b\x2d2f0f\x2d7fe5ee064d73.mount: Deactivated successfully. Jul 11 00:47:32.440946 systemd-networkd[1057]: calia37be693ec1: Link UP Jul 11 00:47:32.443141 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calia37be693ec1: link becomes ready Jul 11 00:47:32.442754 systemd-networkd[1057]: calia37be693ec1: Gained carrier Jul 11 00:47:32.473789 env[1214]: 2025-07-11 00:47:32.369 [INFO][2514] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.0.0.4-k8s-csi--node--driver--nmdwm-eth0 csi-node-driver- calico-system 52e0b70b-1770-423a-bbff-f30656e42551 1231 0 2025-07-11 00:47:08 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:8967bcb6f k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:csi-node-driver] map[] [] [] []} {k8s 10.0.0.4 csi-node-driver-nmdwm eth0 csi-node-driver [] [] [kns.calico-system ksa.calico-system.csi-node-driver] calia37be693ec1 [] [] }} ContainerID="85db24031cd442b24f008bb22266b1168c10c4ae0c73404c387ce2555f156a2f" Namespace="calico-system" Pod="csi-node-driver-nmdwm" WorkloadEndpoint="10.0.0.4-k8s-csi--node--driver--nmdwm-" Jul 11 00:47:32.473789 env[1214]: 2025-07-11 00:47:32.369 [INFO][2514] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="85db24031cd442b24f008bb22266b1168c10c4ae0c73404c387ce2555f156a2f" Namespace="calico-system" Pod="csi-node-driver-nmdwm" WorkloadEndpoint="10.0.0.4-k8s-csi--node--driver--nmdwm-eth0" Jul 11 00:47:32.473789 env[1214]: 2025-07-11 00:47:32.397 [INFO][2529] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="85db24031cd442b24f008bb22266b1168c10c4ae0c73404c387ce2555f156a2f" HandleID="k8s-pod-network.85db24031cd442b24f008bb22266b1168c10c4ae0c73404c387ce2555f156a2f" Workload="10.0.0.4-k8s-csi--node--driver--nmdwm-eth0" Jul 11 00:47:32.473789 env[1214]: 2025-07-11 00:47:32.397 [INFO][2529] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="85db24031cd442b24f008bb22266b1168c10c4ae0c73404c387ce2555f156a2f" HandleID="k8s-pod-network.85db24031cd442b24f008bb22266b1168c10c4ae0c73404c387ce2555f156a2f" Workload="10.0.0.4-k8s-csi--node--driver--nmdwm-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x40002c3860), Attrs:map[string]string{"namespace":"calico-system", "node":"10.0.0.4", "pod":"csi-node-driver-nmdwm", "timestamp":"2025-07-11 00:47:32.397582917 +0000 UTC"}, Hostname:"10.0.0.4", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Jul 11 00:47:32.473789 env[1214]: 2025-07-11 00:47:32.397 [INFO][2529] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Jul 11 00:47:32.473789 env[1214]: 2025-07-11 00:47:32.397 [INFO][2529] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Jul 11 00:47:32.473789 env[1214]: 2025-07-11 00:47:32.397 [INFO][2529] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.0.0.4' Jul 11 00:47:32.473789 env[1214]: 2025-07-11 00:47:32.412 [INFO][2529] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.85db24031cd442b24f008bb22266b1168c10c4ae0c73404c387ce2555f156a2f" host="10.0.0.4" Jul 11 00:47:32.473789 env[1214]: 2025-07-11 00:47:32.417 [INFO][2529] ipam/ipam.go 394: Looking up existing affinities for host host="10.0.0.4" Jul 11 00:47:32.473789 env[1214]: 2025-07-11 00:47:32.422 [INFO][2529] ipam/ipam.go 511: Trying affinity for 192.168.99.192/26 host="10.0.0.4" Jul 11 00:47:32.473789 env[1214]: 2025-07-11 00:47:32.424 [INFO][2529] ipam/ipam.go 158: Attempting to load block cidr=192.168.99.192/26 host="10.0.0.4" Jul 11 00:47:32.473789 env[1214]: 2025-07-11 00:47:32.426 [INFO][2529] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.99.192/26 host="10.0.0.4" Jul 11 00:47:32.473789 env[1214]: 2025-07-11 00:47:32.426 [INFO][2529] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.99.192/26 handle="k8s-pod-network.85db24031cd442b24f008bb22266b1168c10c4ae0c73404c387ce2555f156a2f" host="10.0.0.4" Jul 11 00:47:32.473789 env[1214]: 2025-07-11 00:47:32.428 [INFO][2529] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.85db24031cd442b24f008bb22266b1168c10c4ae0c73404c387ce2555f156a2f Jul 11 00:47:32.473789 env[1214]: 2025-07-11 00:47:32.432 [INFO][2529] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.99.192/26 handle="k8s-pod-network.85db24031cd442b24f008bb22266b1168c10c4ae0c73404c387ce2555f156a2f" host="10.0.0.4" Jul 11 00:47:32.473789 env[1214]: 2025-07-11 00:47:32.436 [INFO][2529] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.99.194/26] block=192.168.99.192/26 handle="k8s-pod-network.85db24031cd442b24f008bb22266b1168c10c4ae0c73404c387ce2555f156a2f" host="10.0.0.4" Jul 11 00:47:32.473789 env[1214]: 2025-07-11 00:47:32.437 [INFO][2529] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.99.194/26] handle="k8s-pod-network.85db24031cd442b24f008bb22266b1168c10c4ae0c73404c387ce2555f156a2f" host="10.0.0.4" Jul 11 00:47:32.473789 env[1214]: 2025-07-11 00:47:32.437 [INFO][2529] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Jul 11 00:47:32.473789 env[1214]: 2025-07-11 00:47:32.437 [INFO][2529] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.99.194/26] IPv6=[] ContainerID="85db24031cd442b24f008bb22266b1168c10c4ae0c73404c387ce2555f156a2f" HandleID="k8s-pod-network.85db24031cd442b24f008bb22266b1168c10c4ae0c73404c387ce2555f156a2f" Workload="10.0.0.4-k8s-csi--node--driver--nmdwm-eth0" Jul 11 00:47:32.472000 audit[2542]: NETFILTER_CFG table=filter:82 family=2 entries=42 op=nft_register_chain pid=2542 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 11 00:47:32.472000 audit[2542]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=22552 a0=3 a1=ffffd9810b00 a2=0 a3=ffff84989fa8 items=0 ppid=2141 pid=2542 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 11 00:47:32.472000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 11 00:47:32.474514 env[1214]: 2025-07-11 00:47:32.438 [INFO][2514] cni-plugin/k8s.go 418: Populated endpoint ContainerID="85db24031cd442b24f008bb22266b1168c10c4ae0c73404c387ce2555f156a2f" Namespace="calico-system" Pod="csi-node-driver-nmdwm" WorkloadEndpoint="10.0.0.4-k8s-csi--node--driver--nmdwm-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.4-k8s-csi--node--driver--nmdwm-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"52e0b70b-1770-423a-bbff-f30656e42551", ResourceVersion:"1231", Generation:0, CreationTimestamp:time.Date(2025, time.July, 11, 0, 47, 8, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"8967bcb6f", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.4", ContainerID:"", Pod:"csi-node-driver-nmdwm", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.99.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"calia37be693ec1", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Jul 11 00:47:32.474514 env[1214]: 2025-07-11 00:47:32.438 [INFO][2514] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.99.194/32] ContainerID="85db24031cd442b24f008bb22266b1168c10c4ae0c73404c387ce2555f156a2f" Namespace="calico-system" Pod="csi-node-driver-nmdwm" WorkloadEndpoint="10.0.0.4-k8s-csi--node--driver--nmdwm-eth0" Jul 11 00:47:32.474514 env[1214]: 2025-07-11 00:47:32.438 [INFO][2514] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calia37be693ec1 ContainerID="85db24031cd442b24f008bb22266b1168c10c4ae0c73404c387ce2555f156a2f" Namespace="calico-system" Pod="csi-node-driver-nmdwm" WorkloadEndpoint="10.0.0.4-k8s-csi--node--driver--nmdwm-eth0" Jul 11 00:47:32.474514 env[1214]: 2025-07-11 00:47:32.444 [INFO][2514] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="85db24031cd442b24f008bb22266b1168c10c4ae0c73404c387ce2555f156a2f" Namespace="calico-system" Pod="csi-node-driver-nmdwm" WorkloadEndpoint="10.0.0.4-k8s-csi--node--driver--nmdwm-eth0" Jul 11 00:47:32.474514 env[1214]: 2025-07-11 00:47:32.449 [INFO][2514] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="85db24031cd442b24f008bb22266b1168c10c4ae0c73404c387ce2555f156a2f" Namespace="calico-system" Pod="csi-node-driver-nmdwm" WorkloadEndpoint="10.0.0.4-k8s-csi--node--driver--nmdwm-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.4-k8s-csi--node--driver--nmdwm-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"52e0b70b-1770-423a-bbff-f30656e42551", ResourceVersion:"1231", Generation:0, CreationTimestamp:time.Date(2025, time.July, 11, 0, 47, 8, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"8967bcb6f", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.4", ContainerID:"85db24031cd442b24f008bb22266b1168c10c4ae0c73404c387ce2555f156a2f", Pod:"csi-node-driver-nmdwm", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.99.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"calia37be693ec1", MAC:"3e:bc:38:41:6b:75", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Jul 11 00:47:32.474514 env[1214]: 2025-07-11 00:47:32.462 [INFO][2514] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="85db24031cd442b24f008bb22266b1168c10c4ae0c73404c387ce2555f156a2f" Namespace="calico-system" Pod="csi-node-driver-nmdwm" WorkloadEndpoint="10.0.0.4-k8s-csi--node--driver--nmdwm-eth0" Jul 11 00:47:32.489227 env[1214]: time="2025-07-11T00:47:32.489137849Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 11 00:47:32.489227 env[1214]: time="2025-07-11T00:47:32.489173477Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 11 00:47:32.489227 env[1214]: time="2025-07-11T00:47:32.489184394Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 11 00:47:32.489538 env[1214]: time="2025-07-11T00:47:32.489490939Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/85db24031cd442b24f008bb22266b1168c10c4ae0c73404c387ce2555f156a2f pid=2556 runtime=io.containerd.runc.v2 Jul 11 00:47:32.514703 systemd[1]: Started cri-containerd-85db24031cd442b24f008bb22266b1168c10c4ae0c73404c387ce2555f156a2f.scope. Jul 11 00:47:32.529000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:32.529000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:32.529000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:32.529000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:32.529000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:32.529000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:32.529000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:32.529000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:32.529000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:32.529000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:32.529000 audit: BPF prog-id=101 op=LOAD Jul 11 00:47:32.529000 audit[2566]: AVC avc: denied { bpf } for pid=2566 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:32.529000 audit[2566]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=2556 pid=2566 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 11 00:47:32.529000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3835646232343033316364343432623234663030386262323232363662 Jul 11 00:47:32.529000 audit[2566]: AVC avc: denied { perfmon } for pid=2566 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:32.529000 audit[2566]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2556 pid=2566 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 11 00:47:32.529000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3835646232343033316364343432623234663030386262323232363662 Jul 11 00:47:32.529000 audit[2566]: AVC avc: denied { bpf } for pid=2566 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:32.529000 audit[2566]: AVC avc: denied { bpf } for pid=2566 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:32.529000 audit[2566]: AVC avc: denied { bpf } for pid=2566 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:32.529000 audit[2566]: AVC avc: denied { perfmon } for pid=2566 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:32.529000 audit[2566]: AVC avc: denied { perfmon } for pid=2566 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:32.529000 audit[2566]: AVC avc: denied { perfmon } for pid=2566 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:32.529000 audit[2566]: AVC avc: denied { perfmon } for pid=2566 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:32.529000 audit[2566]: AVC avc: denied { perfmon } for pid=2566 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:32.529000 audit[2566]: AVC avc: denied { bpf } for pid=2566 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:32.529000 audit[2566]: AVC avc: denied { bpf } for pid=2566 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:32.529000 audit: BPF prog-id=102 op=LOAD Jul 11 00:47:32.529000 audit[2566]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2556 pid=2566 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 11 00:47:32.529000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3835646232343033316364343432623234663030386262323232363662 Jul 11 00:47:32.530000 audit[2566]: AVC avc: denied { bpf } for pid=2566 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:32.530000 audit[2566]: AVC avc: denied { bpf } for pid=2566 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:32.530000 audit[2566]: AVC avc: denied { perfmon } for pid=2566 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:32.530000 audit[2566]: AVC avc: denied { perfmon } for pid=2566 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:32.530000 audit[2566]: AVC avc: denied { perfmon } for pid=2566 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:32.530000 audit[2566]: AVC avc: denied { perfmon } for pid=2566 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:32.530000 audit[2566]: AVC avc: denied { perfmon } for pid=2566 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:32.530000 audit[2566]: AVC avc: denied { bpf } for pid=2566 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:32.530000 audit[2566]: AVC avc: denied { bpf } for pid=2566 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:32.530000 audit: BPF prog-id=103 op=LOAD Jul 11 00:47:32.530000 audit[2566]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2556 pid=2566 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 11 00:47:32.530000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3835646232343033316364343432623234663030386262323232363662 Jul 11 00:47:32.530000 audit: BPF prog-id=103 op=UNLOAD Jul 11 00:47:32.530000 audit: BPF prog-id=102 op=UNLOAD Jul 11 00:47:32.530000 audit[2566]: AVC avc: denied { bpf } for pid=2566 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:32.530000 audit[2566]: AVC avc: denied { bpf } for pid=2566 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:32.530000 audit[2566]: AVC avc: denied { bpf } for pid=2566 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:32.530000 audit[2566]: AVC avc: denied { perfmon } for pid=2566 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:32.530000 audit[2566]: AVC avc: denied { perfmon } for pid=2566 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:32.530000 audit[2566]: AVC avc: denied { perfmon } for pid=2566 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:32.530000 audit[2566]: AVC avc: denied { perfmon } for pid=2566 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:32.530000 audit[2566]: AVC avc: denied { perfmon } for pid=2566 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:32.530000 audit[2566]: AVC avc: denied { bpf } for pid=2566 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:32.530000 audit[2566]: AVC avc: denied { bpf } for pid=2566 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:32.530000 audit: BPF prog-id=104 op=LOAD Jul 11 00:47:32.530000 audit[2566]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2556 pid=2566 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 11 00:47:32.530000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3835646232343033316364343432623234663030386262323232363662 Jul 11 00:47:32.531703 systemd-resolved[1156]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Jul 11 00:47:32.543776 env[1214]: time="2025-07-11T00:47:32.543068919Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-nmdwm,Uid:52e0b70b-1770-423a-bbff-f30656e42551,Namespace:calico-system,Attempt:1,} returns sandbox id \"85db24031cd442b24f008bb22266b1168c10c4ae0c73404c387ce2555f156a2f\"" Jul 11 00:47:33.071644 kubelet[1454]: E0711 00:47:33.071587 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 11 00:47:33.196247 systemd-networkd[1057]: caliab859cb9d6d: Gained IPv6LL Jul 11 00:47:33.596823 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2309985476.mount: Deactivated successfully. Jul 11 00:47:34.072196 kubelet[1454]: E0711 00:47:34.072155 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 11 00:47:34.092294 systemd-networkd[1057]: calia37be693ec1: Gained IPv6LL Jul 11 00:47:34.271000 audit[2596]: NETFILTER_CFG table=filter:83 family=2 entries=11 op=nft_register_rule pid=2596 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 11 00:47:34.271000 audit[2596]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3760 a0=3 a1=ffffe232e8c0 a2=0 a3=1 items=0 ppid=1622 pid=2596 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 11 00:47:34.271000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 11 00:47:34.276000 audit[2596]: NETFILTER_CFG table=nat:84 family=2 entries=29 op=nft_register_chain pid=2596 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 11 00:47:34.276000 audit[2596]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=10116 a0=3 a1=ffffe232e8c0 a2=0 a3=1 items=0 ppid=1622 pid=2596 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 11 00:47:34.276000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 11 00:47:34.298000 audit[2598]: NETFILTER_CFG table=filter:85 family=2 entries=10 op=nft_register_rule pid=2598 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 11 00:47:34.298000 audit[2598]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3760 a0=3 a1=ffffdf9897f0 a2=0 a3=1 items=0 ppid=1622 pid=2598 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 11 00:47:34.298000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 11 00:47:34.306000 audit[2598]: NETFILTER_CFG table=nat:86 family=2 entries=32 op=nft_register_rule pid=2598 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 11 00:47:34.306000 audit[2598]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=10116 a0=3 a1=ffffdf9897f0 a2=0 a3=1 items=0 ppid=1622 pid=2598 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 11 00:47:34.306000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 11 00:47:34.417979 systemd[1]: Created slice kubepods-besteffort-pod8e0504b6_2b22_4c3d_8aa1_0215342463ba.slice. Jul 11 00:47:34.501464 kubelet[1454]: I0711 00:47:34.501422 1454 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/8e0504b6-2b22-4c3d-8aa1-0215342463ba-calico-apiserver-certs\") pod \"calico-apiserver-d9699865b-nsbpm\" (UID: \"8e0504b6-2b22-4c3d-8aa1-0215342463ba\") " pod="calico-apiserver/calico-apiserver-d9699865b-nsbpm" Jul 11 00:47:34.501464 kubelet[1454]: I0711 00:47:34.501466 1454 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-7j4tk\" (UniqueName: \"kubernetes.io/projected/8e0504b6-2b22-4c3d-8aa1-0215342463ba-kube-api-access-7j4tk\") pod \"calico-apiserver-d9699865b-nsbpm\" (UID: \"8e0504b6-2b22-4c3d-8aa1-0215342463ba\") " pod="calico-apiserver/calico-apiserver-d9699865b-nsbpm" Jul 11 00:47:34.724821 env[1214]: time="2025-07-11T00:47:34.724535182Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-d9699865b-nsbpm,Uid:8e0504b6-2b22-4c3d-8aa1-0215342463ba,Namespace:calico-apiserver,Attempt:0,}" Jul 11 00:47:34.730375 env[1214]: time="2025-07-11T00:47:34.730330236Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 11 00:47:34.731758 env[1214]: time="2025-07-11T00:47:34.731721852Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:cd8b38a4e22587134e82fff3512a99b84799274d989a1ec20f58c7f8c89b8511,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 11 00:47:34.734771 env[1214]: time="2025-07-11T00:47:34.734738594Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 11 00:47:34.740104 env[1214]: time="2025-07-11T00:47:34.740068949Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx@sha256:30bb68e656e0665bce700e67d2756f68bdca3345fa1099a32bfdb8febcf621cd,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 11 00:47:34.740831 env[1214]: time="2025-07-11T00:47:34.740800756Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:cd8b38a4e22587134e82fff3512a99b84799274d989a1ec20f58c7f8c89b8511\"" Jul 11 00:47:34.743643 env[1214]: time="2025-07-11T00:47:34.743617826Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.30.2\"" Jul 11 00:47:34.746377 env[1214]: time="2025-07-11T00:47:34.746332462Z" level=info msg="CreateContainer within sandbox \"7821d3a048c85ce6895da578777586a645e16c37a1232734c59f8b211da71071\" for container &ContainerMetadata{Name:nginx,Attempt:0,}" Jul 11 00:47:34.755308 env[1214]: time="2025-07-11T00:47:34.755264452Z" level=info msg="CreateContainer within sandbox \"7821d3a048c85ce6895da578777586a645e16c37a1232734c59f8b211da71071\" for &ContainerMetadata{Name:nginx,Attempt:0,} returns container id \"fee6cb7b48bfe59ac2a2f9075dc483490849a6c99ca812d4ced3a4237d4e9173\"" Jul 11 00:47:34.755608 env[1214]: time="2025-07-11T00:47:34.755583638Z" level=info msg="StartContainer for \"fee6cb7b48bfe59ac2a2f9075dc483490849a6c99ca812d4ced3a4237d4e9173\"" Jul 11 00:47:34.773975 systemd[1]: Started cri-containerd-fee6cb7b48bfe59ac2a2f9075dc483490849a6c99ca812d4ced3a4237d4e9173.scope. Jul 11 00:47:34.798000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:34.798000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:34.798000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:34.798000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:34.798000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:34.798000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:34.798000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:34.798000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:34.798000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:34.798000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:34.798000 audit: BPF prog-id=105 op=LOAD Jul 11 00:47:34.799000 audit[2622]: AVC avc: denied { bpf } for pid=2622 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:34.799000 audit[2622]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=2447 pid=2622 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 11 00:47:34.799000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6665653663623762343862666535396163326132663930373564633438 Jul 11 00:47:34.799000 audit[2622]: AVC avc: denied { perfmon } for pid=2622 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:34.799000 audit[2622]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2447 pid=2622 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 11 00:47:34.799000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6665653663623762343862666535396163326132663930373564633438 Jul 11 00:47:34.799000 audit[2622]: AVC avc: denied { bpf } for pid=2622 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:34.799000 audit[2622]: AVC avc: denied { bpf } for pid=2622 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:34.799000 audit[2622]: AVC avc: denied { bpf } for pid=2622 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:34.799000 audit[2622]: AVC avc: denied { perfmon } for pid=2622 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:34.799000 audit[2622]: AVC avc: denied { perfmon } for pid=2622 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:34.799000 audit[2622]: AVC avc: denied { perfmon } for pid=2622 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:34.799000 audit[2622]: AVC avc: denied { perfmon } for pid=2622 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:34.799000 audit[2622]: AVC avc: denied { perfmon } for pid=2622 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:34.799000 audit[2622]: AVC avc: denied { bpf } for pid=2622 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:34.799000 audit[2622]: AVC avc: denied { bpf } for pid=2622 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:34.799000 audit: BPF prog-id=106 op=LOAD Jul 11 00:47:34.799000 audit[2622]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=2447 pid=2622 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 11 00:47:34.799000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6665653663623762343862666535396163326132663930373564633438 Jul 11 00:47:34.799000 audit[2622]: AVC avc: denied { bpf } for pid=2622 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:34.799000 audit[2622]: AVC avc: denied { bpf } for pid=2622 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:34.799000 audit[2622]: AVC avc: denied { perfmon } for pid=2622 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:34.799000 audit[2622]: AVC avc: denied { perfmon } for pid=2622 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:34.799000 audit[2622]: AVC avc: denied { perfmon } for pid=2622 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:34.799000 audit[2622]: AVC avc: denied { perfmon } for pid=2622 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:34.799000 audit[2622]: AVC avc: denied { perfmon } for pid=2622 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:34.799000 audit[2622]: AVC avc: denied { bpf } for pid=2622 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:34.799000 audit[2622]: AVC avc: denied { bpf } for pid=2622 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:34.799000 audit: BPF prog-id=107 op=LOAD Jul 11 00:47:34.799000 audit[2622]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=2447 pid=2622 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 11 00:47:34.799000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6665653663623762343862666535396163326132663930373564633438 Jul 11 00:47:34.799000 audit: BPF prog-id=107 op=UNLOAD Jul 11 00:47:34.799000 audit: BPF prog-id=106 op=UNLOAD Jul 11 00:47:34.799000 audit[2622]: AVC avc: denied { bpf } for pid=2622 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:34.799000 audit[2622]: AVC avc: denied { bpf } for pid=2622 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:34.799000 audit[2622]: AVC avc: denied { bpf } for pid=2622 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:34.799000 audit[2622]: AVC avc: denied { perfmon } for pid=2622 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:34.799000 audit[2622]: AVC avc: denied { perfmon } for pid=2622 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:34.799000 audit[2622]: AVC avc: denied { perfmon } for pid=2622 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:34.799000 audit[2622]: AVC avc: denied { perfmon } for pid=2622 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:34.799000 audit[2622]: AVC avc: denied { perfmon } for pid=2622 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:34.799000 audit[2622]: AVC avc: denied { bpf } for pid=2622 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:34.799000 audit[2622]: AVC avc: denied { bpf } for pid=2622 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:34.799000 audit: BPF prog-id=108 op=LOAD Jul 11 00:47:34.799000 audit[2622]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=2447 pid=2622 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 11 00:47:34.799000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6665653663623762343862666535396163326132663930373564633438 Jul 11 00:47:34.855389 env[1214]: time="2025-07-11T00:47:34.855342982Z" level=info msg="StartContainer for \"fee6cb7b48bfe59ac2a2f9075dc483490849a6c99ca812d4ced3a4237d4e9173\" returns successfully" Jul 11 00:47:34.900272 systemd-networkd[1057]: cali63137239fd8: Link UP Jul 11 00:47:34.905433 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Jul 11 00:47:34.905529 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali63137239fd8: link becomes ready Jul 11 00:47:34.905172 systemd-networkd[1057]: cali63137239fd8: Gained carrier Jul 11 00:47:34.914141 env[1214]: 2025-07-11 00:47:34.833 [INFO][2602] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.0.0.4-k8s-calico--apiserver--d9699865b--nsbpm-eth0 calico-apiserver-d9699865b- calico-apiserver 8e0504b6-2b22-4c3d-8aa1-0215342463ba 1269 0 2025-07-11 00:47:34 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:d9699865b projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s 10.0.0.4 calico-apiserver-d9699865b-nsbpm eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] cali63137239fd8 [] [] }} ContainerID="0eff5fbf702dbb8651bf97cae6b23891b86f7bc606262747ab9f085d29c48255" Namespace="calico-apiserver" Pod="calico-apiserver-d9699865b-nsbpm" WorkloadEndpoint="10.0.0.4-k8s-calico--apiserver--d9699865b--nsbpm-" Jul 11 00:47:34.914141 env[1214]: 2025-07-11 00:47:34.833 [INFO][2602] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="0eff5fbf702dbb8651bf97cae6b23891b86f7bc606262747ab9f085d29c48255" Namespace="calico-apiserver" Pod="calico-apiserver-d9699865b-nsbpm" WorkloadEndpoint="10.0.0.4-k8s-calico--apiserver--d9699865b--nsbpm-eth0" Jul 11 00:47:34.914141 env[1214]: 2025-07-11 00:47:34.859 [INFO][2660] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="0eff5fbf702dbb8651bf97cae6b23891b86f7bc606262747ab9f085d29c48255" HandleID="k8s-pod-network.0eff5fbf702dbb8651bf97cae6b23891b86f7bc606262747ab9f085d29c48255" Workload="10.0.0.4-k8s-calico--apiserver--d9699865b--nsbpm-eth0" Jul 11 00:47:34.914141 env[1214]: 2025-07-11 00:47:34.859 [INFO][2660] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="0eff5fbf702dbb8651bf97cae6b23891b86f7bc606262747ab9f085d29c48255" HandleID="k8s-pod-network.0eff5fbf702dbb8651bf97cae6b23891b86f7bc606262747ab9f085d29c48255" Workload="10.0.0.4-k8s-calico--apiserver--d9699865b--nsbpm-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x40002c32f0), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"10.0.0.4", "pod":"calico-apiserver-d9699865b-nsbpm", "timestamp":"2025-07-11 00:47:34.859331799 +0000 UTC"}, Hostname:"10.0.0.4", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Jul 11 00:47:34.914141 env[1214]: 2025-07-11 00:47:34.859 [INFO][2660] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Jul 11 00:47:34.914141 env[1214]: 2025-07-11 00:47:34.859 [INFO][2660] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Jul 11 00:47:34.914141 env[1214]: 2025-07-11 00:47:34.859 [INFO][2660] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.0.0.4' Jul 11 00:47:34.914141 env[1214]: 2025-07-11 00:47:34.872 [INFO][2660] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.0eff5fbf702dbb8651bf97cae6b23891b86f7bc606262747ab9f085d29c48255" host="10.0.0.4" Jul 11 00:47:34.914141 env[1214]: 2025-07-11 00:47:34.878 [INFO][2660] ipam/ipam.go 394: Looking up existing affinities for host host="10.0.0.4" Jul 11 00:47:34.914141 env[1214]: 2025-07-11 00:47:34.883 [INFO][2660] ipam/ipam.go 511: Trying affinity for 192.168.99.192/26 host="10.0.0.4" Jul 11 00:47:34.914141 env[1214]: 2025-07-11 00:47:34.884 [INFO][2660] ipam/ipam.go 158: Attempting to load block cidr=192.168.99.192/26 host="10.0.0.4" Jul 11 00:47:34.914141 env[1214]: 2025-07-11 00:47:34.886 [INFO][2660] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.99.192/26 host="10.0.0.4" Jul 11 00:47:34.914141 env[1214]: 2025-07-11 00:47:34.886 [INFO][2660] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.99.192/26 handle="k8s-pod-network.0eff5fbf702dbb8651bf97cae6b23891b86f7bc606262747ab9f085d29c48255" host="10.0.0.4" Jul 11 00:47:34.914141 env[1214]: 2025-07-11 00:47:34.888 [INFO][2660] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.0eff5fbf702dbb8651bf97cae6b23891b86f7bc606262747ab9f085d29c48255 Jul 11 00:47:34.914141 env[1214]: 2025-07-11 00:47:34.891 [INFO][2660] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.99.192/26 handle="k8s-pod-network.0eff5fbf702dbb8651bf97cae6b23891b86f7bc606262747ab9f085d29c48255" host="10.0.0.4" Jul 11 00:47:34.914141 env[1214]: 2025-07-11 00:47:34.896 [INFO][2660] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.99.195/26] block=192.168.99.192/26 handle="k8s-pod-network.0eff5fbf702dbb8651bf97cae6b23891b86f7bc606262747ab9f085d29c48255" host="10.0.0.4" Jul 11 00:47:34.914141 env[1214]: 2025-07-11 00:47:34.896 [INFO][2660] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.99.195/26] handle="k8s-pod-network.0eff5fbf702dbb8651bf97cae6b23891b86f7bc606262747ab9f085d29c48255" host="10.0.0.4" Jul 11 00:47:34.914141 env[1214]: 2025-07-11 00:47:34.896 [INFO][2660] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Jul 11 00:47:34.914141 env[1214]: 2025-07-11 00:47:34.896 [INFO][2660] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.99.195/26] IPv6=[] ContainerID="0eff5fbf702dbb8651bf97cae6b23891b86f7bc606262747ab9f085d29c48255" HandleID="k8s-pod-network.0eff5fbf702dbb8651bf97cae6b23891b86f7bc606262747ab9f085d29c48255" Workload="10.0.0.4-k8s-calico--apiserver--d9699865b--nsbpm-eth0" Jul 11 00:47:34.914677 env[1214]: 2025-07-11 00:47:34.898 [INFO][2602] cni-plugin/k8s.go 418: Populated endpoint ContainerID="0eff5fbf702dbb8651bf97cae6b23891b86f7bc606262747ab9f085d29c48255" Namespace="calico-apiserver" Pod="calico-apiserver-d9699865b-nsbpm" WorkloadEndpoint="10.0.0.4-k8s-calico--apiserver--d9699865b--nsbpm-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.4-k8s-calico--apiserver--d9699865b--nsbpm-eth0", GenerateName:"calico-apiserver-d9699865b-", Namespace:"calico-apiserver", SelfLink:"", UID:"8e0504b6-2b22-4c3d-8aa1-0215342463ba", ResourceVersion:"1269", Generation:0, CreationTimestamp:time.Date(2025, time.July, 11, 0, 47, 34, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"d9699865b", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.4", ContainerID:"", Pod:"calico-apiserver-d9699865b-nsbpm", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.99.195/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali63137239fd8", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Jul 11 00:47:34.914677 env[1214]: 2025-07-11 00:47:34.898 [INFO][2602] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.99.195/32] ContainerID="0eff5fbf702dbb8651bf97cae6b23891b86f7bc606262747ab9f085d29c48255" Namespace="calico-apiserver" Pod="calico-apiserver-d9699865b-nsbpm" WorkloadEndpoint="10.0.0.4-k8s-calico--apiserver--d9699865b--nsbpm-eth0" Jul 11 00:47:34.914677 env[1214]: 2025-07-11 00:47:34.898 [INFO][2602] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali63137239fd8 ContainerID="0eff5fbf702dbb8651bf97cae6b23891b86f7bc606262747ab9f085d29c48255" Namespace="calico-apiserver" Pod="calico-apiserver-d9699865b-nsbpm" WorkloadEndpoint="10.0.0.4-k8s-calico--apiserver--d9699865b--nsbpm-eth0" Jul 11 00:47:34.914677 env[1214]: 2025-07-11 00:47:34.900 [INFO][2602] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="0eff5fbf702dbb8651bf97cae6b23891b86f7bc606262747ab9f085d29c48255" Namespace="calico-apiserver" Pod="calico-apiserver-d9699865b-nsbpm" WorkloadEndpoint="10.0.0.4-k8s-calico--apiserver--d9699865b--nsbpm-eth0" Jul 11 00:47:34.914677 env[1214]: 2025-07-11 00:47:34.901 [INFO][2602] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="0eff5fbf702dbb8651bf97cae6b23891b86f7bc606262747ab9f085d29c48255" Namespace="calico-apiserver" Pod="calico-apiserver-d9699865b-nsbpm" WorkloadEndpoint="10.0.0.4-k8s-calico--apiserver--d9699865b--nsbpm-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.4-k8s-calico--apiserver--d9699865b--nsbpm-eth0", GenerateName:"calico-apiserver-d9699865b-", Namespace:"calico-apiserver", SelfLink:"", UID:"8e0504b6-2b22-4c3d-8aa1-0215342463ba", ResourceVersion:"1269", Generation:0, CreationTimestamp:time.Date(2025, time.July, 11, 0, 47, 34, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"d9699865b", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.4", ContainerID:"0eff5fbf702dbb8651bf97cae6b23891b86f7bc606262747ab9f085d29c48255", Pod:"calico-apiserver-d9699865b-nsbpm", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.99.195/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali63137239fd8", MAC:"d2:94:7d:1d:e8:20", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Jul 11 00:47:34.914677 env[1214]: 2025-07-11 00:47:34.907 [INFO][2602] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="0eff5fbf702dbb8651bf97cae6b23891b86f7bc606262747ab9f085d29c48255" Namespace="calico-apiserver" Pod="calico-apiserver-d9699865b-nsbpm" WorkloadEndpoint="10.0.0.4-k8s-calico--apiserver--d9699865b--nsbpm-eth0" Jul 11 00:47:34.919000 audit[2688]: NETFILTER_CFG table=filter:87 family=2 entries=60 op=nft_register_chain pid=2688 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 11 00:47:34.919000 audit[2688]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=32248 a0=3 a1=ffffefb38730 a2=0 a3=ffff81798fa8 items=0 ppid=2141 pid=2688 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 11 00:47:34.919000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 11 00:47:34.937914 env[1214]: time="2025-07-11T00:47:34.937745922Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 11 00:47:34.937914 env[1214]: time="2025-07-11T00:47:34.937784640Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 11 00:47:34.937914 env[1214]: time="2025-07-11T00:47:34.937794560Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 11 00:47:34.938072 env[1214]: time="2025-07-11T00:47:34.937970192Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/0eff5fbf702dbb8651bf97cae6b23891b86f7bc606262747ab9f085d29c48255 pid=2701 runtime=io.containerd.runc.v2 Jul 11 00:47:34.947280 systemd[1]: Started cri-containerd-0eff5fbf702dbb8651bf97cae6b23891b86f7bc606262747ab9f085d29c48255.scope. Jul 11 00:47:34.964000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:34.964000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:34.964000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:34.964000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:34.964000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:34.964000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:34.964000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:34.964000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:34.964000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:34.964000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:34.964000 audit: BPF prog-id=109 op=LOAD Jul 11 00:47:34.964000 audit[2711]: AVC avc: denied { bpf } for pid=2711 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:34.964000 audit[2711]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=2701 pid=2711 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 11 00:47:34.964000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3065666635666266373032646262383635316266393763616536623233 Jul 11 00:47:34.964000 audit[2711]: AVC avc: denied { perfmon } for pid=2711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:34.964000 audit[2711]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2701 pid=2711 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 11 00:47:34.964000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3065666635666266373032646262383635316266393763616536623233 Jul 11 00:47:34.964000 audit[2711]: AVC avc: denied { bpf } for pid=2711 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:34.964000 audit[2711]: AVC avc: denied { bpf } for pid=2711 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:34.964000 audit[2711]: AVC avc: denied { bpf } for pid=2711 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:34.964000 audit[2711]: AVC avc: denied { perfmon } for pid=2711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:34.964000 audit[2711]: AVC avc: denied { perfmon } for pid=2711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:34.964000 audit[2711]: AVC avc: denied { perfmon } for pid=2711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:34.964000 audit[2711]: AVC avc: denied { perfmon } for pid=2711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:34.964000 audit[2711]: AVC avc: denied { perfmon } for pid=2711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:34.964000 audit[2711]: AVC avc: denied { bpf } for pid=2711 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:34.964000 audit[2711]: AVC avc: denied { bpf } for pid=2711 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:34.964000 audit: BPF prog-id=110 op=LOAD Jul 11 00:47:34.964000 audit[2711]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2701 pid=2711 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 11 00:47:34.964000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3065666635666266373032646262383635316266393763616536623233 Jul 11 00:47:34.965000 audit[2711]: AVC avc: denied { bpf } for pid=2711 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:34.965000 audit[2711]: AVC avc: denied { bpf } for pid=2711 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:34.965000 audit[2711]: AVC avc: denied { perfmon } for pid=2711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:34.965000 audit[2711]: AVC avc: denied { perfmon } for pid=2711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:34.965000 audit[2711]: AVC avc: denied { perfmon } for pid=2711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:34.965000 audit[2711]: AVC avc: denied { perfmon } for pid=2711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:34.965000 audit[2711]: AVC avc: denied { perfmon } for pid=2711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:34.965000 audit[2711]: AVC avc: denied { bpf } for pid=2711 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:34.965000 audit[2711]: AVC avc: denied { bpf } for pid=2711 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:34.965000 audit: BPF prog-id=111 op=LOAD Jul 11 00:47:34.965000 audit[2711]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2701 pid=2711 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 11 00:47:34.965000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3065666635666266373032646262383635316266393763616536623233 Jul 11 00:47:34.965000 audit: BPF prog-id=111 op=UNLOAD Jul 11 00:47:34.965000 audit: BPF prog-id=110 op=UNLOAD Jul 11 00:47:34.965000 audit[2711]: AVC avc: denied { bpf } for pid=2711 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:34.965000 audit[2711]: AVC avc: denied { bpf } for pid=2711 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:34.965000 audit[2711]: AVC avc: denied { bpf } for pid=2711 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:34.965000 audit[2711]: AVC avc: denied { perfmon } for pid=2711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:34.965000 audit[2711]: AVC avc: denied { perfmon } for pid=2711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:34.965000 audit[2711]: AVC avc: denied { perfmon } for pid=2711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:34.965000 audit[2711]: AVC avc: denied { perfmon } for pid=2711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:34.965000 audit[2711]: AVC avc: denied { perfmon } for pid=2711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:34.965000 audit[2711]: AVC avc: denied { bpf } for pid=2711 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:34.965000 audit[2711]: AVC avc: denied { bpf } for pid=2711 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:34.965000 audit: BPF prog-id=112 op=LOAD Jul 11 00:47:34.965000 audit[2711]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2701 pid=2711 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 11 00:47:34.965000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3065666635666266373032646262383635316266393763616536623233 Jul 11 00:47:34.966717 systemd-resolved[1156]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Jul 11 00:47:34.981387 env[1214]: time="2025-07-11T00:47:34.981300404Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-d9699865b-nsbpm,Uid:8e0504b6-2b22-4c3d-8aa1-0215342463ba,Namespace:calico-apiserver,Attempt:0,} returns sandbox id \"0eff5fbf702dbb8651bf97cae6b23891b86f7bc606262747ab9f085d29c48255\"" Jul 11 00:47:35.072974 kubelet[1454]: E0711 00:47:35.072940 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 11 00:47:35.320000 audit[2735]: NETFILTER_CFG table=filter:88 family=2 entries=10 op=nft_register_rule pid=2735 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 11 00:47:35.320000 audit[2735]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3760 a0=3 a1=fffff681da30 a2=0 a3=1 items=0 ppid=1622 pid=2735 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 11 00:47:35.320000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 11 00:47:35.331000 audit[2735]: NETFILTER_CFG table=nat:89 family=2 entries=32 op=nft_register_rule pid=2735 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 11 00:47:35.331000 audit[2735]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=10116 a0=3 a1=fffff681da30 a2=0 a3=1 items=0 ppid=1622 pid=2735 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 11 00:47:35.331000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 11 00:47:35.612418 env[1214]: time="2025-07-11T00:47:35.612328458Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.30.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 11 00:47:35.613738 env[1214]: time="2025-07-11T00:47:35.613705398Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:14ecfabbdbebd1f5a36708f8b11a95a43baddd6a935d7d78c89a9c333849fcd2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 11 00:47:35.615188 env[1214]: time="2025-07-11T00:47:35.615153576Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.30.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 11 00:47:35.616639 env[1214]: time="2025-07-11T00:47:35.616607193Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:e570128aa8067a2f06b96d3cc98afa2e0a4b9790b435ee36ca051c8e72aeb8d0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 11 00:47:35.617055 env[1214]: time="2025-07-11T00:47:35.617032614Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.30.2\" returns image reference \"sha256:14ecfabbdbebd1f5a36708f8b11a95a43baddd6a935d7d78c89a9c333849fcd2\"" Jul 11 00:47:35.618622 env[1214]: time="2025-07-11T00:47:35.618557788Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.30.2\"" Jul 11 00:47:35.620953 env[1214]: time="2025-07-11T00:47:35.620922926Z" level=info msg="CreateContainer within sandbox \"85db24031cd442b24f008bb22266b1168c10c4ae0c73404c387ce2555f156a2f\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" Jul 11 00:47:35.635221 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2276483857.mount: Deactivated successfully. Jul 11 00:47:35.637936 env[1214]: time="2025-07-11T00:47:35.637897430Z" level=info msg="CreateContainer within sandbox \"85db24031cd442b24f008bb22266b1168c10c4ae0c73404c387ce2555f156a2f\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"277195fefdec161ef5141bbb41c8c71730f287e23acc71825339ab9aa209e380\"" Jul 11 00:47:35.638607 env[1214]: time="2025-07-11T00:47:35.638579921Z" level=info msg="StartContainer for \"277195fefdec161ef5141bbb41c8c71730f287e23acc71825339ab9aa209e380\"" Jul 11 00:47:35.655997 systemd[1]: Started cri-containerd-277195fefdec161ef5141bbb41c8c71730f287e23acc71825339ab9aa209e380.scope. Jul 11 00:47:35.688000 audit[2744]: AVC avc: denied { perfmon } for pid=2744 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:35.688000 audit[2744]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2556 pid=2744 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 11 00:47:35.688000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3237373139356665666465633136316566353134316262623431633863 Jul 11 00:47:35.689000 audit[2744]: AVC avc: denied { bpf } for pid=2744 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:35.689000 audit[2744]: AVC avc: denied { bpf } for pid=2744 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:35.689000 audit[2744]: AVC avc: denied { bpf } for pid=2744 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:35.689000 audit[2744]: AVC avc: denied { perfmon } for pid=2744 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:35.689000 audit[2744]: AVC avc: denied { perfmon } for pid=2744 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:35.689000 audit[2744]: AVC avc: denied { perfmon } for pid=2744 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:35.689000 audit[2744]: AVC avc: denied { perfmon } for pid=2744 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:35.689000 audit[2744]: AVC avc: denied { perfmon } for pid=2744 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:35.689000 audit[2744]: AVC avc: denied { bpf } for pid=2744 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:35.689000 audit[2744]: AVC avc: denied { bpf } for pid=2744 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:35.689000 audit: BPF prog-id=113 op=LOAD Jul 11 00:47:35.689000 audit[2744]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=2556 pid=2744 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 11 00:47:35.689000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3237373139356665666465633136316566353134316262623431633863 Jul 11 00:47:35.689000 audit[2744]: AVC avc: denied { bpf } for pid=2744 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:35.689000 audit[2744]: AVC avc: denied { bpf } for pid=2744 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:35.689000 audit[2744]: AVC avc: denied { perfmon } for pid=2744 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:35.689000 audit[2744]: AVC avc: denied { perfmon } for pid=2744 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:35.689000 audit[2744]: AVC avc: denied { perfmon } for pid=2744 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:35.689000 audit[2744]: AVC avc: denied { perfmon } for pid=2744 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:35.689000 audit[2744]: AVC avc: denied { perfmon } for pid=2744 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:35.689000 audit[2744]: AVC avc: denied { bpf } for pid=2744 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:35.689000 audit[2744]: AVC avc: denied { bpf } for pid=2744 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:35.689000 audit: BPF prog-id=114 op=LOAD Jul 11 00:47:35.689000 audit[2744]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=2556 pid=2744 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 11 00:47:35.689000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3237373139356665666465633136316566353134316262623431633863 Jul 11 00:47:35.689000 audit: BPF prog-id=114 op=UNLOAD Jul 11 00:47:35.689000 audit: BPF prog-id=113 op=UNLOAD Jul 11 00:47:35.689000 audit[2744]: AVC avc: denied { bpf } for pid=2744 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:35.689000 audit[2744]: AVC avc: denied { bpf } for pid=2744 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:35.689000 audit[2744]: AVC avc: denied { bpf } for pid=2744 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:35.689000 audit[2744]: AVC avc: denied { perfmon } for pid=2744 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:35.689000 audit[2744]: AVC avc: denied { perfmon } for pid=2744 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:35.689000 audit[2744]: AVC avc: denied { perfmon } for pid=2744 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:35.689000 audit[2744]: AVC avc: denied { perfmon } for pid=2744 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:35.689000 audit[2744]: AVC avc: denied { perfmon } for pid=2744 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:35.689000 audit[2744]: AVC avc: denied { bpf } for pid=2744 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:35.689000 audit[2744]: AVC avc: denied { bpf } for pid=2744 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:35.689000 audit: BPF prog-id=115 op=LOAD Jul 11 00:47:35.689000 audit[2744]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=2556 pid=2744 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 11 00:47:35.689000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3237373139356665666465633136316566353134316262623431633863 Jul 11 00:47:35.705407 env[1214]: time="2025-07-11T00:47:35.705355268Z" level=info msg="StartContainer for \"277195fefdec161ef5141bbb41c8c71730f287e23acc71825339ab9aa209e380\" returns successfully" Jul 11 00:47:36.073178 kubelet[1454]: E0711 00:47:36.073092 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 11 00:47:36.633000 audit[2771]: NETFILTER_CFG table=filter:90 family=2 entries=22 op=nft_register_rule pid=2771 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 11 00:47:36.635678 kernel: kauditd_printk_skb: 288 callbacks suppressed Jul 11 00:47:36.635730 kernel: audit: type=1325 audit(1752194856.633:741): table=filter:90 family=2 entries=22 op=nft_register_rule pid=2771 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 11 00:47:36.633000 audit[2771]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=12688 a0=3 a1=ffffe734fec0 a2=0 a3=1 items=0 ppid=1622 pid=2771 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 11 00:47:36.645357 kernel: audit: type=1300 audit(1752194856.633:741): arch=c00000b7 syscall=211 success=yes exit=12688 a0=3 a1=ffffe734fec0 a2=0 a3=1 items=0 ppid=1622 pid=2771 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 11 00:47:36.645424 kernel: audit: type=1327 audit(1752194856.633:741): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 11 00:47:36.633000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 11 00:47:36.649000 audit[2771]: NETFILTER_CFG table=nat:91 family=2 entries=24 op=nft_register_rule pid=2771 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 11 00:47:36.649000 audit[2771]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=7308 a0=3 a1=ffffe734fec0 a2=0 a3=1 items=0 ppid=1622 pid=2771 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 11 00:47:36.657177 kernel: audit: type=1325 audit(1752194856.649:742): table=nat:91 family=2 entries=24 op=nft_register_rule pid=2771 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 11 00:47:36.657239 kernel: audit: type=1300 audit(1752194856.649:742): arch=c00000b7 syscall=211 success=yes exit=7308 a0=3 a1=ffffe734fec0 a2=0 a3=1 items=0 ppid=1622 pid=2771 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 11 00:47:36.649000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 11 00:47:36.659283 kernel: audit: type=1327 audit(1752194856.649:742): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 11 00:47:36.687062 kubelet[1454]: I0711 00:47:36.686992 1454 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="default/nginx-deployment-7fcdb87857-gnckl" podStartSLOduration=14.496489799 podStartE2EDuration="17.686974498s" podCreationTimestamp="2025-07-11 00:47:19 +0000 UTC" firstStartedPulling="2025-07-11 00:47:31.552597752 +0000 UTC m=+24.012385934" lastFinishedPulling="2025-07-11 00:47:34.743082451 +0000 UTC m=+27.202870633" observedRunningTime="2025-07-11 00:47:35.322030314 +0000 UTC m=+27.781818576" watchObservedRunningTime="2025-07-11 00:47:36.686974498 +0000 UTC m=+29.146762680" Jul 11 00:47:36.693433 systemd[1]: Created slice kubepods-besteffort-pod6c02febe_1828_4bb5_be2a_505e3434a8cd.slice. Jul 11 00:47:36.716001 kubelet[1454]: I0711 00:47:36.715949 1454 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"data\" (UniqueName: \"kubernetes.io/empty-dir/6c02febe-1828-4bb5-be2a-505e3434a8cd-data\") pod \"nfs-server-provisioner-0\" (UID: \"6c02febe-1828-4bb5-be2a-505e3434a8cd\") " pod="default/nfs-server-provisioner-0" Jul 11 00:47:36.716001 kubelet[1454]: I0711 00:47:36.716003 1454 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-ggmc2\" (UniqueName: \"kubernetes.io/projected/6c02febe-1828-4bb5-be2a-505e3434a8cd-kube-api-access-ggmc2\") pod \"nfs-server-provisioner-0\" (UID: \"6c02febe-1828-4bb5-be2a-505e3434a8cd\") " pod="default/nfs-server-provisioner-0" Jul 11 00:47:36.908250 systemd-networkd[1057]: cali63137239fd8: Gained IPv6LL Jul 11 00:47:36.996604 env[1214]: time="2025-07-11T00:47:36.996554947Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:6c02febe-1828-4bb5-be2a-505e3434a8cd,Namespace:default,Attempt:0,}" Jul 11 00:47:37.073456 kubelet[1454]: E0711 00:47:37.073412 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 11 00:47:37.159660 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Jul 11 00:47:37.159771 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali60e51b789ff: link becomes ready Jul 11 00:47:37.157867 systemd-networkd[1057]: cali60e51b789ff: Link UP Jul 11 00:47:37.159777 systemd-networkd[1057]: cali60e51b789ff: Gained carrier Jul 11 00:47:37.179429 env[1214]: 2025-07-11 00:47:37.077 [INFO][2774] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.0.0.4-k8s-nfs--server--provisioner--0-eth0 nfs-server-provisioner- default 6c02febe-1828-4bb5-be2a-505e3434a8cd 1317 0 2025-07-11 00:47:36 +0000 UTC map[app:nfs-server-provisioner apps.kubernetes.io/pod-index:0 chart:nfs-server-provisioner-1.8.0 controller-revision-hash:nfs-server-provisioner-d5cbb7f57 heritage:Helm projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:nfs-server-provisioner release:nfs-server-provisioner statefulset.kubernetes.io/pod-name:nfs-server-provisioner-0] map[] [] [] []} {k8s 10.0.0.4 nfs-server-provisioner-0 eth0 nfs-server-provisioner [] [] [kns.default ksa.default.nfs-server-provisioner] cali60e51b789ff [{nfs TCP 2049 0 } {nfs-udp UDP 2049 0 } {nlockmgr TCP 32803 0 } {nlockmgr-udp UDP 32803 0 } {mountd TCP 20048 0 } {mountd-udp UDP 20048 0 } {rquotad TCP 875 0 } {rquotad-udp UDP 875 0 } {rpcbind TCP 111 0 } {rpcbind-udp UDP 111 0 } {statd TCP 662 0 } {statd-udp UDP 662 0 }] [] }} ContainerID="77be2af99c0936022d1724d74a1bcb121d413be2ad87e9855f9e03baec108fcb" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.4-k8s-nfs--server--provisioner--0-" Jul 11 00:47:37.179429 env[1214]: 2025-07-11 00:47:37.077 [INFO][2774] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="77be2af99c0936022d1724d74a1bcb121d413be2ad87e9855f9e03baec108fcb" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.4-k8s-nfs--server--provisioner--0-eth0" Jul 11 00:47:37.179429 env[1214]: 2025-07-11 00:47:37.104 [INFO][2788] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="77be2af99c0936022d1724d74a1bcb121d413be2ad87e9855f9e03baec108fcb" HandleID="k8s-pod-network.77be2af99c0936022d1724d74a1bcb121d413be2ad87e9855f9e03baec108fcb" Workload="10.0.0.4-k8s-nfs--server--provisioner--0-eth0" Jul 11 00:47:37.179429 env[1214]: 2025-07-11 00:47:37.104 [INFO][2788] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="77be2af99c0936022d1724d74a1bcb121d413be2ad87e9855f9e03baec108fcb" HandleID="k8s-pod-network.77be2af99c0936022d1724d74a1bcb121d413be2ad87e9855f9e03baec108fcb" Workload="10.0.0.4-k8s-nfs--server--provisioner--0-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x40002dd630), Attrs:map[string]string{"namespace":"default", "node":"10.0.0.4", "pod":"nfs-server-provisioner-0", "timestamp":"2025-07-11 00:47:37.104028298 +0000 UTC"}, Hostname:"10.0.0.4", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Jul 11 00:47:37.179429 env[1214]: 2025-07-11 00:47:37.104 [INFO][2788] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Jul 11 00:47:37.179429 env[1214]: 2025-07-11 00:47:37.104 [INFO][2788] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Jul 11 00:47:37.179429 env[1214]: 2025-07-11 00:47:37.104 [INFO][2788] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.0.0.4' Jul 11 00:47:37.179429 env[1214]: 2025-07-11 00:47:37.114 [INFO][2788] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.77be2af99c0936022d1724d74a1bcb121d413be2ad87e9855f9e03baec108fcb" host="10.0.0.4" Jul 11 00:47:37.179429 env[1214]: 2025-07-11 00:47:37.121 [INFO][2788] ipam/ipam.go 394: Looking up existing affinities for host host="10.0.0.4" Jul 11 00:47:37.179429 env[1214]: 2025-07-11 00:47:37.131 [INFO][2788] ipam/ipam.go 511: Trying affinity for 192.168.99.192/26 host="10.0.0.4" Jul 11 00:47:37.179429 env[1214]: 2025-07-11 00:47:37.136 [INFO][2788] ipam/ipam.go 158: Attempting to load block cidr=192.168.99.192/26 host="10.0.0.4" Jul 11 00:47:37.179429 env[1214]: 2025-07-11 00:47:37.139 [INFO][2788] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.99.192/26 host="10.0.0.4" Jul 11 00:47:37.179429 env[1214]: 2025-07-11 00:47:37.139 [INFO][2788] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.99.192/26 handle="k8s-pod-network.77be2af99c0936022d1724d74a1bcb121d413be2ad87e9855f9e03baec108fcb" host="10.0.0.4" Jul 11 00:47:37.179429 env[1214]: 2025-07-11 00:47:37.141 [INFO][2788] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.77be2af99c0936022d1724d74a1bcb121d413be2ad87e9855f9e03baec108fcb Jul 11 00:47:37.179429 env[1214]: 2025-07-11 00:47:37.146 [INFO][2788] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.99.192/26 handle="k8s-pod-network.77be2af99c0936022d1724d74a1bcb121d413be2ad87e9855f9e03baec108fcb" host="10.0.0.4" Jul 11 00:47:37.179429 env[1214]: 2025-07-11 00:47:37.152 [INFO][2788] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.99.196/26] block=192.168.99.192/26 handle="k8s-pod-network.77be2af99c0936022d1724d74a1bcb121d413be2ad87e9855f9e03baec108fcb" host="10.0.0.4" Jul 11 00:47:37.179429 env[1214]: 2025-07-11 00:47:37.152 [INFO][2788] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.99.196/26] handle="k8s-pod-network.77be2af99c0936022d1724d74a1bcb121d413be2ad87e9855f9e03baec108fcb" host="10.0.0.4" Jul 11 00:47:37.179429 env[1214]: 2025-07-11 00:47:37.152 [INFO][2788] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Jul 11 00:47:37.179429 env[1214]: 2025-07-11 00:47:37.152 [INFO][2788] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.99.196/26] IPv6=[] ContainerID="77be2af99c0936022d1724d74a1bcb121d413be2ad87e9855f9e03baec108fcb" HandleID="k8s-pod-network.77be2af99c0936022d1724d74a1bcb121d413be2ad87e9855f9e03baec108fcb" Workload="10.0.0.4-k8s-nfs--server--provisioner--0-eth0" Jul 11 00:47:37.180023 env[1214]: 2025-07-11 00:47:37.153 [INFO][2774] cni-plugin/k8s.go 418: Populated endpoint ContainerID="77be2af99c0936022d1724d74a1bcb121d413be2ad87e9855f9e03baec108fcb" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.4-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.4-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"6c02febe-1828-4bb5-be2a-505e3434a8cd", ResourceVersion:"1317", Generation:0, CreationTimestamp:time.Date(2025, time.July, 11, 0, 47, 36, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "apps.kubernetes.io/pod-index":"0", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.4", ContainerID:"", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.99.196/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Jul 11 00:47:37.180023 env[1214]: 2025-07-11 00:47:37.153 [INFO][2774] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.99.196/32] ContainerID="77be2af99c0936022d1724d74a1bcb121d413be2ad87e9855f9e03baec108fcb" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.4-k8s-nfs--server--provisioner--0-eth0" Jul 11 00:47:37.180023 env[1214]: 2025-07-11 00:47:37.154 [INFO][2774] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali60e51b789ff ContainerID="77be2af99c0936022d1724d74a1bcb121d413be2ad87e9855f9e03baec108fcb" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.4-k8s-nfs--server--provisioner--0-eth0" Jul 11 00:47:37.180023 env[1214]: 2025-07-11 00:47:37.159 [INFO][2774] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="77be2af99c0936022d1724d74a1bcb121d413be2ad87e9855f9e03baec108fcb" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.4-k8s-nfs--server--provisioner--0-eth0" Jul 11 00:47:37.180197 env[1214]: 2025-07-11 00:47:37.163 [INFO][2774] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="77be2af99c0936022d1724d74a1bcb121d413be2ad87e9855f9e03baec108fcb" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.4-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.4-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"6c02febe-1828-4bb5-be2a-505e3434a8cd", ResourceVersion:"1317", Generation:0, CreationTimestamp:time.Date(2025, time.July, 11, 0, 47, 36, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "apps.kubernetes.io/pod-index":"0", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.4", ContainerID:"77be2af99c0936022d1724d74a1bcb121d413be2ad87e9855f9e03baec108fcb", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.99.196/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"52:46:f3:b1:13:8c", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Jul 11 00:47:37.180197 env[1214]: 2025-07-11 00:47:37.174 [INFO][2774] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="77be2af99c0936022d1724d74a1bcb121d413be2ad87e9855f9e03baec108fcb" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.4-k8s-nfs--server--provisioner--0-eth0" Jul 11 00:47:37.186000 audit[2810]: NETFILTER_CFG table=filter:92 family=2 entries=46 op=nft_register_chain pid=2810 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 11 00:47:37.189351 env[1214]: time="2025-07-11T00:47:37.189293239Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 11 00:47:37.189351 env[1214]: time="2025-07-11T00:47:37.189332238Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 11 00:47:37.189351 env[1214]: time="2025-07-11T00:47:37.189342317Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 11 00:47:37.189606 env[1214]: time="2025-07-11T00:47:37.189559269Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/77be2af99c0936022d1724d74a1bcb121d413be2ad87e9855f9e03baec108fcb pid=2814 runtime=io.containerd.runc.v2 Jul 11 00:47:37.186000 audit[2810]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=23592 a0=3 a1=fffff751ea90 a2=0 a3=ffffb2901fa8 items=0 ppid=2141 pid=2810 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 11 00:47:37.193950 kernel: audit: type=1325 audit(1752194857.186:743): table=filter:92 family=2 entries=46 op=nft_register_chain pid=2810 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 11 00:47:37.194003 kernel: audit: type=1300 audit(1752194857.186:743): arch=c00000b7 syscall=211 success=yes exit=23592 a0=3 a1=fffff751ea90 a2=0 a3=ffffb2901fa8 items=0 ppid=2141 pid=2810 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 11 00:47:37.194026 kernel: audit: type=1327 audit(1752194857.186:743): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 11 00:47:37.186000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 11 00:47:37.214021 systemd[1]: Started cri-containerd-77be2af99c0936022d1724d74a1bcb121d413be2ad87e9855f9e03baec108fcb.scope. Jul 11 00:47:37.244130 kernel: audit: type=1400 audit(1752194857.240:744): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:37.240000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:37.240000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:37.240000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:37.240000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:37.240000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:37.240000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:37.240000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:37.240000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:37.240000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:37.242000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:37.242000 audit: BPF prog-id=116 op=LOAD Jul 11 00:47:37.243000 audit[2824]: AVC avc: denied { bpf } for pid=2824 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:37.243000 audit[2824]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=2814 pid=2824 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 11 00:47:37.243000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3737626532616639396330393336303232643137323464373461316263 Jul 11 00:47:37.243000 audit[2824]: AVC avc: denied { perfmon } for pid=2824 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:37.243000 audit[2824]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2814 pid=2824 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 11 00:47:37.243000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3737626532616639396330393336303232643137323464373461316263 Jul 11 00:47:37.243000 audit[2824]: AVC avc: denied { bpf } for pid=2824 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:37.243000 audit[2824]: AVC avc: denied { bpf } for pid=2824 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:37.243000 audit[2824]: AVC avc: denied { bpf } for pid=2824 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:37.243000 audit[2824]: AVC avc: denied { perfmon } for pid=2824 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:37.243000 audit[2824]: AVC avc: denied { perfmon } for pid=2824 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:37.243000 audit[2824]: AVC avc: denied { perfmon } for pid=2824 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:37.243000 audit[2824]: AVC avc: denied { perfmon } for pid=2824 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:37.243000 audit[2824]: AVC avc: denied { perfmon } for pid=2824 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:37.243000 audit[2824]: AVC avc: denied { bpf } for pid=2824 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:37.243000 audit[2824]: AVC avc: denied { bpf } for pid=2824 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:37.243000 audit: BPF prog-id=117 op=LOAD Jul 11 00:47:37.243000 audit[2824]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2814 pid=2824 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 11 00:47:37.243000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3737626532616639396330393336303232643137323464373461316263 Jul 11 00:47:37.243000 audit[2824]: AVC avc: denied { bpf } for pid=2824 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:37.243000 audit[2824]: AVC avc: denied { bpf } for pid=2824 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:37.243000 audit[2824]: AVC avc: denied { perfmon } for pid=2824 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:37.243000 audit[2824]: AVC avc: denied { perfmon } for pid=2824 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:37.243000 audit[2824]: AVC avc: denied { perfmon } for pid=2824 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:37.243000 audit[2824]: AVC avc: denied { perfmon } for pid=2824 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:37.243000 audit[2824]: AVC avc: denied { perfmon } for pid=2824 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:37.243000 audit[2824]: AVC avc: denied { bpf } for pid=2824 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:37.243000 audit[2824]: AVC avc: denied { bpf } for pid=2824 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:37.243000 audit: BPF prog-id=118 op=LOAD Jul 11 00:47:37.243000 audit[2824]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2814 pid=2824 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 11 00:47:37.243000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3737626532616639396330393336303232643137323464373461316263 Jul 11 00:47:37.243000 audit: BPF prog-id=118 op=UNLOAD Jul 11 00:47:37.243000 audit: BPF prog-id=117 op=UNLOAD Jul 11 00:47:37.243000 audit[2824]: AVC avc: denied { bpf } for pid=2824 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:37.243000 audit[2824]: AVC avc: denied { bpf } for pid=2824 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:37.243000 audit[2824]: AVC avc: denied { bpf } for pid=2824 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:37.243000 audit[2824]: AVC avc: denied { perfmon } for pid=2824 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:37.243000 audit[2824]: AVC avc: denied { perfmon } for pid=2824 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:37.243000 audit[2824]: AVC avc: denied { perfmon } for pid=2824 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:37.243000 audit[2824]: AVC avc: denied { perfmon } for pid=2824 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:37.243000 audit[2824]: AVC avc: denied { perfmon } for pid=2824 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:37.243000 audit[2824]: AVC avc: denied { bpf } for pid=2824 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:37.243000 audit[2824]: AVC avc: denied { bpf } for pid=2824 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:37.243000 audit: BPF prog-id=119 op=LOAD Jul 11 00:47:37.243000 audit[2824]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2814 pid=2824 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 11 00:47:37.243000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3737626532616639396330393336303232643137323464373461316263 Jul 11 00:47:37.246990 systemd-resolved[1156]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Jul 11 00:47:37.268051 env[1214]: time="2025-07-11T00:47:37.268004634Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:6c02febe-1828-4bb5-be2a-505e3434a8cd,Namespace:default,Attempt:0,} returns sandbox id \"77be2af99c0936022d1724d74a1bcb121d413be2ad87e9855f9e03baec108fcb\"" Jul 11 00:47:37.306648 env[1214]: time="2025-07-11T00:47:37.306597501Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver:v3.30.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 11 00:47:37.307941 env[1214]: time="2025-07-11T00:47:37.307908410Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:3371ea1b18040228ef58c964e49b96f4291def748753dfbc0aef87a55f906b8f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 11 00:47:37.309387 env[1214]: time="2025-07-11T00:47:37.309362394Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.30.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 11 00:47:37.310754 env[1214]: time="2025-07-11T00:47:37.310722741Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver@sha256:ec6b10660962e7caad70c47755049fad68f9fc2f7064e8bc7cb862583e02cc2b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 11 00:47:37.311221 env[1214]: time="2025-07-11T00:47:37.311192643Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.30.2\" returns image reference \"sha256:3371ea1b18040228ef58c964e49b96f4291def748753dfbc0aef87a55f906b8f\"" Jul 11 00:47:37.312456 env[1214]: time="2025-07-11T00:47:37.312426315Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.2\"" Jul 11 00:47:37.315622 env[1214]: time="2025-07-11T00:47:37.315570433Z" level=info msg="CreateContainer within sandbox \"0eff5fbf702dbb8651bf97cae6b23891b86f7bc606262747ab9f085d29c48255\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" Jul 11 00:47:37.325540 env[1214]: time="2025-07-11T00:47:37.325488930Z" level=info msg="CreateContainer within sandbox \"0eff5fbf702dbb8651bf97cae6b23891b86f7bc606262747ab9f085d29c48255\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"eb11b2b422bea8edac6fd747244e1f8bffbd59ac9ee2b24a0414ccf315cb06fe\"" Jul 11 00:47:37.325994 env[1214]: time="2025-07-11T00:47:37.325962551Z" level=info msg="StartContainer for \"eb11b2b422bea8edac6fd747244e1f8bffbd59ac9ee2b24a0414ccf315cb06fe\"" Jul 11 00:47:37.340129 systemd[1]: Started cri-containerd-eb11b2b422bea8edac6fd747244e1f8bffbd59ac9ee2b24a0414ccf315cb06fe.scope. Jul 11 00:47:37.363000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:37.363000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:37.363000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:37.363000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:37.363000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:37.363000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:37.363000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:37.363000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:37.363000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:37.363000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:37.363000 audit: BPF prog-id=120 op=LOAD Jul 11 00:47:37.363000 audit[2855]: AVC avc: denied { bpf } for pid=2855 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:37.363000 audit[2855]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=2701 pid=2855 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 11 00:47:37.363000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6562313162326234323262656138656461633666643734373234346531 Jul 11 00:47:37.363000 audit[2855]: AVC avc: denied { perfmon } for pid=2855 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:37.363000 audit[2855]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2701 pid=2855 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 11 00:47:37.363000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6562313162326234323262656138656461633666643734373234346531 Jul 11 00:47:37.363000 audit[2855]: AVC avc: denied { bpf } for pid=2855 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:37.363000 audit[2855]: AVC avc: denied { bpf } for pid=2855 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:37.363000 audit[2855]: AVC avc: denied { bpf } for pid=2855 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:37.363000 audit[2855]: AVC avc: denied { perfmon } for pid=2855 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:37.363000 audit[2855]: AVC avc: denied { perfmon } for pid=2855 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:37.363000 audit[2855]: AVC avc: denied { perfmon } for pid=2855 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:37.363000 audit[2855]: AVC avc: denied { perfmon } for pid=2855 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:37.363000 audit[2855]: AVC avc: denied { perfmon } for pid=2855 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:37.363000 audit[2855]: AVC avc: denied { bpf } for pid=2855 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:37.363000 audit[2855]: AVC avc: denied { bpf } for pid=2855 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:37.363000 audit: BPF prog-id=121 op=LOAD Jul 11 00:47:37.363000 audit[2855]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2701 pid=2855 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 11 00:47:37.363000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6562313162326234323262656138656461633666643734373234346531 Jul 11 00:47:37.364000 audit[2855]: AVC avc: denied { bpf } for pid=2855 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:37.364000 audit[2855]: AVC avc: denied { bpf } for pid=2855 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:37.364000 audit[2855]: AVC avc: denied { perfmon } for pid=2855 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:37.364000 audit[2855]: AVC avc: denied { perfmon } for pid=2855 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:37.364000 audit[2855]: AVC avc: denied { perfmon } for pid=2855 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:37.364000 audit[2855]: AVC avc: denied { perfmon } for pid=2855 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:37.364000 audit[2855]: AVC avc: denied { perfmon } for pid=2855 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:37.364000 audit[2855]: AVC avc: denied { bpf } for pid=2855 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:37.364000 audit[2855]: AVC avc: denied { bpf } for pid=2855 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:37.364000 audit: BPF prog-id=122 op=LOAD Jul 11 00:47:37.364000 audit[2855]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2701 pid=2855 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 11 00:47:37.364000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6562313162326234323262656138656461633666643734373234346531 Jul 11 00:47:37.364000 audit: BPF prog-id=122 op=UNLOAD Jul 11 00:47:37.364000 audit: BPF prog-id=121 op=UNLOAD Jul 11 00:47:37.364000 audit[2855]: AVC avc: denied { bpf } for pid=2855 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:37.364000 audit[2855]: AVC avc: denied { bpf } for pid=2855 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:37.364000 audit[2855]: AVC avc: denied { bpf } for pid=2855 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:37.364000 audit[2855]: AVC avc: denied { perfmon } for pid=2855 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:37.364000 audit[2855]: AVC avc: denied { perfmon } for pid=2855 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:37.364000 audit[2855]: AVC avc: denied { perfmon } for pid=2855 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:37.364000 audit[2855]: AVC avc: denied { perfmon } for pid=2855 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:37.364000 audit[2855]: AVC avc: denied { perfmon } for pid=2855 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:37.364000 audit[2855]: AVC avc: denied { bpf } for pid=2855 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:37.364000 audit[2855]: AVC avc: denied { bpf } for pid=2855 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:37.364000 audit: BPF prog-id=123 op=LOAD Jul 11 00:47:37.364000 audit[2855]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2701 pid=2855 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 11 00:47:37.364000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6562313162326234323262656138656461633666643734373234346531 Jul 11 00:47:37.387547 env[1214]: time="2025-07-11T00:47:37.384327933Z" level=info msg="StartContainer for \"eb11b2b422bea8edac6fd747244e1f8bffbd59ac9ee2b24a0414ccf315cb06fe\" returns successfully" Jul 11 00:47:37.669000 audit[2891]: NETFILTER_CFG table=filter:93 family=2 entries=34 op=nft_register_rule pid=2891 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 11 00:47:37.669000 audit[2891]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=12688 a0=3 a1=ffffd241af70 a2=0 a3=1 items=0 ppid=1622 pid=2891 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 11 00:47:37.669000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 11 00:47:37.683000 audit[2891]: NETFILTER_CFG table=nat:94 family=2 entries=24 op=nft_register_rule pid=2891 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 11 00:47:37.683000 audit[2891]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=7308 a0=3 a1=ffffd241af70 a2=0 a3=1 items=0 ppid=1622 pid=2891 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 11 00:47:37.683000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 11 00:47:37.828772 systemd[1]: run-containerd-runc-k8s.io-77be2af99c0936022d1724d74a1bcb121d413be2ad87e9855f9e03baec108fcb-runc.vclDF0.mount: Deactivated successfully. Jul 11 00:47:38.074192 kubelet[1454]: E0711 00:47:38.074147 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 11 00:47:38.335640 kubelet[1454]: I0711 00:47:38.335330 1454 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-d9699865b-nsbpm" podStartSLOduration=2.007924519 podStartE2EDuration="4.33531484s" podCreationTimestamp="2025-07-11 00:47:34 +0000 UTC" firstStartedPulling="2025-07-11 00:47:34.984901759 +0000 UTC m=+27.444689901" lastFinishedPulling="2025-07-11 00:47:37.31229204 +0000 UTC m=+29.772080222" observedRunningTime="2025-07-11 00:47:38.335102808 +0000 UTC m=+30.794890990" watchObservedRunningTime="2025-07-11 00:47:38.33531484 +0000 UTC m=+30.795103022" Jul 11 00:47:38.344000 audit[2893]: NETFILTER_CFG table=filter:95 family=2 entries=34 op=nft_register_rule pid=2893 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 11 00:47:38.344000 audit[2893]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=12688 a0=3 a1=ffffcbaaf230 a2=0 a3=1 items=0 ppid=1622 pid=2893 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 11 00:47:38.344000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 11 00:47:38.349000 audit[2893]: NETFILTER_CFG table=nat:96 family=2 entries=32 op=nft_register_rule pid=2893 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 11 00:47:38.349000 audit[2893]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=10116 a0=3 a1=ffffcbaaf230 a2=0 a3=1 items=0 ppid=1622 pid=2893 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 11 00:47:38.349000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 11 00:47:38.390033 env[1214]: time="2025-07-11T00:47:38.389988760Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.30.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 11 00:47:38.391563 env[1214]: time="2025-07-11T00:47:38.391521704Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:664ed31fb4687b0de23d6e6e116bc87b236790d7355871d3237c54452e02e27c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 11 00:47:38.393308 env[1214]: time="2025-07-11T00:47:38.393282399Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.30.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 11 00:47:38.395179 env[1214]: time="2025-07-11T00:47:38.395152211Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:8fec2de12dfa51bae89d941938a07af2598eb8bfcab55d0dded1d9c193d7b99f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 11 00:47:38.395609 env[1214]: time="2025-07-11T00:47:38.395578955Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.2\" returns image reference \"sha256:664ed31fb4687b0de23d6e6e116bc87b236790d7355871d3237c54452e02e27c\"" Jul 11 00:47:38.397277 env[1214]: time="2025-07-11T00:47:38.397243414Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\"" Jul 11 00:47:38.399747 env[1214]: time="2025-07-11T00:47:38.399709644Z" level=info msg="CreateContainer within sandbox \"85db24031cd442b24f008bb22266b1168c10c4ae0c73404c387ce2555f156a2f\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" Jul 11 00:47:38.411276 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2496049197.mount: Deactivated successfully. Jul 11 00:47:38.415433 env[1214]: time="2025-07-11T00:47:38.415397630Z" level=info msg="CreateContainer within sandbox \"85db24031cd442b24f008bb22266b1168c10c4ae0c73404c387ce2555f156a2f\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"4af60612ea44a94e8b3472e95d9c7e0ede1b0003a14d6d42c30c0e3f06e21232\"" Jul 11 00:47:38.416183 env[1214]: time="2025-07-11T00:47:38.416013848Z" level=info msg="StartContainer for \"4af60612ea44a94e8b3472e95d9c7e0ede1b0003a14d6d42c30c0e3f06e21232\"" Jul 11 00:47:38.446550 systemd[1]: Started cri-containerd-4af60612ea44a94e8b3472e95d9c7e0ede1b0003a14d6d42c30c0e3f06e21232.scope. Jul 11 00:47:38.489000 audit[2903]: AVC avc: denied { perfmon } for pid=2903 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:38.489000 audit[2903]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2556 pid=2903 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 11 00:47:38.489000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3461663630363132656134346139346538623334373265393564396337 Jul 11 00:47:38.489000 audit[2903]: AVC avc: denied { bpf } for pid=2903 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:38.489000 audit[2903]: AVC avc: denied { bpf } for pid=2903 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:38.489000 audit[2903]: AVC avc: denied { bpf } for pid=2903 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:38.489000 audit[2903]: AVC avc: denied { perfmon } for pid=2903 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:38.489000 audit[2903]: AVC avc: denied { perfmon } for pid=2903 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:38.489000 audit[2903]: AVC avc: denied { perfmon } for pid=2903 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:38.489000 audit[2903]: AVC avc: denied { perfmon } for pid=2903 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:38.489000 audit[2903]: AVC avc: denied { perfmon } for pid=2903 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:38.489000 audit[2903]: AVC avc: denied { bpf } for pid=2903 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:38.489000 audit[2903]: AVC avc: denied { bpf } for pid=2903 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:38.489000 audit: BPF prog-id=124 op=LOAD Jul 11 00:47:38.489000 audit[2903]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=2556 pid=2903 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 11 00:47:38.489000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3461663630363132656134346139346538623334373265393564396337 Jul 11 00:47:38.489000 audit[2903]: AVC avc: denied { bpf } for pid=2903 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:38.489000 audit[2903]: AVC avc: denied { bpf } for pid=2903 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:38.489000 audit[2903]: AVC avc: denied { perfmon } for pid=2903 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:38.489000 audit[2903]: AVC avc: denied { perfmon } for pid=2903 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:38.489000 audit[2903]: AVC avc: denied { perfmon } for pid=2903 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:38.489000 audit[2903]: AVC avc: denied { perfmon } for pid=2903 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:38.489000 audit[2903]: AVC avc: denied { perfmon } for pid=2903 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:38.489000 audit[2903]: AVC avc: denied { bpf } for pid=2903 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:38.489000 audit[2903]: AVC avc: denied { bpf } for pid=2903 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:38.489000 audit: BPF prog-id=125 op=LOAD Jul 11 00:47:38.489000 audit[2903]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=2556 pid=2903 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 11 00:47:38.489000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3461663630363132656134346139346538623334373265393564396337 Jul 11 00:47:38.489000 audit: BPF prog-id=125 op=UNLOAD Jul 11 00:47:38.489000 audit: BPF prog-id=124 op=UNLOAD Jul 11 00:47:38.489000 audit[2903]: AVC avc: denied { bpf } for pid=2903 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:38.489000 audit[2903]: AVC avc: denied { bpf } for pid=2903 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:38.489000 audit[2903]: AVC avc: denied { bpf } for pid=2903 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:38.489000 audit[2903]: AVC avc: denied { perfmon } for pid=2903 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:38.489000 audit[2903]: AVC avc: denied { perfmon } for pid=2903 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:38.489000 audit[2903]: AVC avc: denied { perfmon } for pid=2903 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:38.489000 audit[2903]: AVC avc: denied { perfmon } for pid=2903 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:38.489000 audit[2903]: AVC avc: denied { perfmon } for pid=2903 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:38.489000 audit[2903]: AVC avc: denied { bpf } for pid=2903 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:38.489000 audit[2903]: AVC avc: denied { bpf } for pid=2903 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:38.489000 audit: BPF prog-id=126 op=LOAD Jul 11 00:47:38.489000 audit[2903]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=2556 pid=2903 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 11 00:47:38.489000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3461663630363132656134346139346538623334373265393564396337 Jul 11 00:47:38.506739 env[1214]: time="2025-07-11T00:47:38.506689130Z" level=info msg="StartContainer for \"4af60612ea44a94e8b3472e95d9c7e0ede1b0003a14d6d42c30c0e3f06e21232\" returns successfully" Jul 11 00:47:38.572340 systemd-networkd[1057]: cali60e51b789ff: Gained IPv6LL Jul 11 00:47:38.964000 audit[2867]: AVC avc: denied { watch } for pid=2867 comm="apiserver" path="/calico-apiserver-certs/..2025_07_11_00_47_34.2038382037/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c179,c960 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c179,c960 tclass=file permissive=0 Jul 11 00:47:38.964000 audit[2867]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=7 a1=40014ef140 a2=fc6 a3=0 items=0 ppid=2701 pid=2867 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c179,c960 key=(null) Jul 11 00:47:38.964000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Jul 11 00:47:39.074873 kubelet[1454]: E0711 00:47:39.074824 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 11 00:47:39.227760 kubelet[1454]: I0711 00:47:39.227620 1454 csi_plugin.go:106] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 Jul 11 00:47:39.227760 kubelet[1454]: I0711 00:47:39.227663 1454 csi_plugin.go:119] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock Jul 11 00:47:39.324612 kubelet[1454]: I0711 00:47:39.324575 1454 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Jul 11 00:47:39.337426 kubelet[1454]: I0711 00:47:39.337370 1454 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/csi-node-driver-nmdwm" podStartSLOduration=25.487681098 podStartE2EDuration="31.337355593s" podCreationTimestamp="2025-07-11 00:47:08 +0000 UTC" firstStartedPulling="2025-07-11 00:47:32.546697431 +0000 UTC m=+25.006485613" lastFinishedPulling="2025-07-11 00:47:38.396371926 +0000 UTC m=+30.856160108" observedRunningTime="2025-07-11 00:47:39.336467783 +0000 UTC m=+31.796255965" watchObservedRunningTime="2025-07-11 00:47:39.337355593 +0000 UTC m=+31.797143775" Jul 11 00:47:40.075619 kubelet[1454]: E0711 00:47:40.075576 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 11 00:47:40.621556 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1365498892.mount: Deactivated successfully. Jul 11 00:47:41.076217 kubelet[1454]: E0711 00:47:41.076178 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 11 00:47:42.077148 kubelet[1454]: E0711 00:47:42.077091 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 11 00:47:42.259615 env[1214]: time="2025-07-11T00:47:42.259569582Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 11 00:47:42.261696 env[1214]: time="2025-07-11T00:47:42.261652281Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:5a42a519e0a8cf95c3c5f18f767c58c8c8b072aaea0a26e5e47a6f206c7df685,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 11 00:47:42.263060 env[1214]: time="2025-07-11T00:47:42.263032241Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 11 00:47:42.264469 env[1214]: time="2025-07-11T00:47:42.264440399Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 11 00:47:42.265251 env[1214]: time="2025-07-11T00:47:42.265218536Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\" returns image reference \"sha256:5a42a519e0a8cf95c3c5f18f767c58c8c8b072aaea0a26e5e47a6f206c7df685\"" Jul 11 00:47:42.269399 env[1214]: time="2025-07-11T00:47:42.269366574Z" level=info msg="CreateContainer within sandbox \"77be2af99c0936022d1724d74a1bcb121d413be2ad87e9855f9e03baec108fcb\" for container &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,}" Jul 11 00:47:42.278310 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2709075933.mount: Deactivated successfully. Jul 11 00:47:42.281464 env[1214]: time="2025-07-11T00:47:42.281422659Z" level=info msg="CreateContainer within sandbox \"77be2af99c0936022d1724d74a1bcb121d413be2ad87e9855f9e03baec108fcb\" for &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,} returns container id \"bad84bf301759b33ea578a1cec0cc4b1366b87f7d7c2671a90ce9db06bd8c318\"" Jul 11 00:47:42.281895 env[1214]: time="2025-07-11T00:47:42.281865926Z" level=info msg="StartContainer for \"bad84bf301759b33ea578a1cec0cc4b1366b87f7d7c2671a90ce9db06bd8c318\"" Jul 11 00:47:42.299809 systemd[1]: run-containerd-runc-k8s.io-bad84bf301759b33ea578a1cec0cc4b1366b87f7d7c2671a90ce9db06bd8c318-runc.3Wi2EZ.mount: Deactivated successfully. Jul 11 00:47:42.301282 systemd[1]: Started cri-containerd-bad84bf301759b33ea578a1cec0cc4b1366b87f7d7c2671a90ce9db06bd8c318.scope. Jul 11 00:47:42.335000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:42.339553 kernel: kauditd_printk_skb: 171 callbacks suppressed Jul 11 00:47:42.339648 kernel: audit: type=1400 audit(1752194862.335:791): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:42.339677 kernel: audit: type=1400 audit(1752194862.335:792): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:42.335000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:42.335000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:42.344455 kernel: audit: type=1400 audit(1752194862.335:793): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:42.344511 kernel: audit: type=1400 audit(1752194862.335:794): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:42.335000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:42.335000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:42.349376 kernel: audit: type=1400 audit(1752194862.335:795): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:42.349420 kernel: audit: type=1400 audit(1752194862.335:796): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:42.335000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:42.335000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:42.354319 kernel: audit: type=1400 audit(1752194862.335:797): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:42.335000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:42.356901 kernel: audit: type=1400 audit(1752194862.335:798): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:42.356978 kernel: audit: type=1400 audit(1752194862.335:799): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:42.335000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:42.335000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:42.361679 kernel: audit: type=1400 audit(1752194862.335:800): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:42.335000 audit: BPF prog-id=127 op=LOAD Jul 11 00:47:42.336000 audit[2943]: AVC avc: denied { bpf } for pid=2943 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:42.336000 audit[2943]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=2814 pid=2943 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 11 00:47:42.336000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6261643834626633303137353962333365613537386131636563306363 Jul 11 00:47:42.336000 audit[2943]: AVC avc: denied { perfmon } for pid=2943 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:42.336000 audit[2943]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2814 pid=2943 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 11 00:47:42.336000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6261643834626633303137353962333365613537386131636563306363 Jul 11 00:47:42.336000 audit[2943]: AVC avc: denied { bpf } for pid=2943 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:42.336000 audit[2943]: AVC avc: denied { bpf } for pid=2943 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:42.336000 audit[2943]: AVC avc: denied { bpf } for pid=2943 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:42.336000 audit[2943]: AVC avc: denied { perfmon } for pid=2943 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:42.336000 audit[2943]: AVC avc: denied { perfmon } for pid=2943 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:42.336000 audit[2943]: AVC avc: denied { perfmon } for pid=2943 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:42.336000 audit[2943]: AVC avc: denied { perfmon } for pid=2943 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:42.336000 audit[2943]: AVC avc: denied { perfmon } for pid=2943 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:42.336000 audit[2943]: AVC avc: denied { bpf } for pid=2943 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:42.336000 audit[2943]: AVC avc: denied { bpf } for pid=2943 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:42.336000 audit: BPF prog-id=128 op=LOAD Jul 11 00:47:42.336000 audit[2943]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=2814 pid=2943 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 11 00:47:42.336000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6261643834626633303137353962333365613537386131636563306363 Jul 11 00:47:42.338000 audit[2943]: AVC avc: denied { bpf } for pid=2943 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:42.338000 audit[2943]: AVC avc: denied { bpf } for pid=2943 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:42.338000 audit[2943]: AVC avc: denied { perfmon } for pid=2943 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:42.338000 audit[2943]: AVC avc: denied { perfmon } for pid=2943 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:42.338000 audit[2943]: AVC avc: denied { perfmon } for pid=2943 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:42.338000 audit[2943]: AVC avc: denied { perfmon } for pid=2943 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:42.338000 audit[2943]: AVC avc: denied { perfmon } for pid=2943 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:42.338000 audit[2943]: AVC avc: denied { bpf } for pid=2943 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:42.338000 audit[2943]: AVC avc: denied { bpf } for pid=2943 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:42.338000 audit: BPF prog-id=129 op=LOAD Jul 11 00:47:42.338000 audit[2943]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=2814 pid=2943 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 11 00:47:42.338000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6261643834626633303137353962333365613537386131636563306363 Jul 11 00:47:42.341000 audit: BPF prog-id=129 op=UNLOAD Jul 11 00:47:42.341000 audit: BPF prog-id=128 op=UNLOAD Jul 11 00:47:42.341000 audit[2943]: AVC avc: denied { bpf } for pid=2943 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:42.341000 audit[2943]: AVC avc: denied { bpf } for pid=2943 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:42.341000 audit[2943]: AVC avc: denied { bpf } for pid=2943 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:42.341000 audit[2943]: AVC avc: denied { perfmon } for pid=2943 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:42.341000 audit[2943]: AVC avc: denied { perfmon } for pid=2943 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:42.341000 audit[2943]: AVC avc: denied { perfmon } for pid=2943 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:42.341000 audit[2943]: AVC avc: denied { perfmon } for pid=2943 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:42.341000 audit[2943]: AVC avc: denied { perfmon } for pid=2943 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:42.341000 audit[2943]: AVC avc: denied { bpf } for pid=2943 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:42.341000 audit[2943]: AVC avc: denied { bpf } for pid=2943 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:42.341000 audit: BPF prog-id=130 op=LOAD Jul 11 00:47:42.341000 audit[2943]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=2814 pid=2943 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 11 00:47:42.341000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6261643834626633303137353962333365613537386131636563306363 Jul 11 00:47:42.363533 env[1214]: time="2025-07-11T00:47:42.363257211Z" level=info msg="StartContainer for \"bad84bf301759b33ea578a1cec0cc4b1366b87f7d7c2671a90ce9db06bd8c318\" returns successfully" Jul 11 00:47:42.471000 audit[2971]: AVC avc: denied { search } for pid=2971 comm="rpcbind" name="crypto" dev="proc" ino=19118 scontext=system_u:system_r:svirt_lxc_net_t:s0:c62,c957 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Jul 11 00:47:42.471000 audit[2971]: SYSCALL arch=c00000b7 syscall=56 success=no exit=-13 a0=ffffffffffffff9c a1=ffffb0d7f000 a2=0 a3=0 items=0 ppid=2953 pid=2971 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="rpcbind" exe="/usr/bin/rpcbind" subj=system_u:system_r:svirt_lxc_net_t:s0:c62,c957 key=(null) Jul 11 00:47:42.471000 audit: PROCTITLE proctitle=2F7573722F7362696E2F72706362696E64002D77 Jul 11 00:47:42.518000 audit[2976]: AVC avc: denied { search } for pid=2976 comm="dbus-daemon" name="crypto" dev="proc" ino=19118 scontext=system_u:system_r:svirt_lxc_net_t:s0:c62,c957 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Jul 11 00:47:42.518000 audit[2976]: SYSCALL arch=c00000b7 syscall=56 success=no exit=-13 a0=ffffffffffffff9c a1=ffff84d6f000 a2=0 a3=0 items=0 ppid=2953 pid=2976 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c62,c957 key=(null) Jul 11 00:47:42.518000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65 Jul 11 00:47:42.528000 audit[2977]: AVC avc: denied { watch } for pid=2977 comm="dbus-daemon" path="/usr/share/dbus-1/system.d" dev="overlay" ino=537702 scontext=system_u:system_r:svirt_lxc_net_t:s0:c62,c957 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c62,c957 tclass=dir permissive=0 Jul 11 00:47:42.528000 audit[2977]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6 a1=aaaae7a3e600 a2=2c8 a3=aaaae7a3aa60 items=0 ppid=2953 pid=2977 auid=4294967295 uid=81 gid=81 euid=81 suid=81 fsuid=81 egid=81 sgid=81 fsgid=81 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c62,c957 key=(null) Jul 11 00:47:42.528000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65 Jul 11 00:47:42.536000 audit[2978]: AVC avc: denied { read } for pid=2978 comm="ganesha.nfsd" name="overcommit_memory" dev="proc" ino=19140 scontext=system_u:system_r:svirt_lxc_net_t:s0:c62,c957 tcontext=system_u:object_r:sysctl_vm_overcommit_t:s0 tclass=file permissive=0 Jul 11 00:47:42.536000 audit[2978]: SYSCALL arch=c00000b7 syscall=56 success=no exit=-13 a0=ffffff9c a1=ffffad95a570 a2=80000 a3=0 items=0 ppid=2953 pid=2978 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c62,c957 key=(null) Jul 11 00:47:42.536000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66 Jul 11 00:47:42.540000 audit[2978]: AVC avc: denied { search } for pid=2978 comm="ganesha.nfsd" name="crypto" dev="proc" ino=19118 scontext=system_u:system_r:svirt_lxc_net_t:s0:c62,c957 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Jul 11 00:47:42.540000 audit[2978]: SYSCALL arch=c00000b7 syscall=56 success=no exit=-13 a0=ffffffffffffff9c a1=ffffaccef000 a2=0 a3=0 items=0 ppid=2953 pid=2978 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c62,c957 key=(null) Jul 11 00:47:42.540000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66 Jul 11 00:47:43.078063 kubelet[1454]: E0711 00:47:43.078014 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 11 00:47:43.344765 kubelet[1454]: I0711 00:47:43.344630 1454 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="default/nfs-server-provisioner-0" podStartSLOduration=2.347577297 podStartE2EDuration="7.344614418s" podCreationTimestamp="2025-07-11 00:47:36 +0000 UTC" firstStartedPulling="2025-07-11 00:47:37.269422059 +0000 UTC m=+29.729210241" lastFinishedPulling="2025-07-11 00:47:42.26645918 +0000 UTC m=+34.726247362" observedRunningTime="2025-07-11 00:47:43.344377025 +0000 UTC m=+35.804165207" watchObservedRunningTime="2025-07-11 00:47:43.344614418 +0000 UTC m=+35.804402600" Jul 11 00:47:43.358000 audit[3002]: NETFILTER_CFG table=filter:97 family=2 entries=22 op=nft_register_rule pid=3002 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 11 00:47:43.358000 audit[3002]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3760 a0=3 a1=ffffe0a35bd0 a2=0 a3=1 items=0 ppid=1622 pid=3002 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 11 00:47:43.358000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 11 00:47:43.365000 audit[3002]: NETFILTER_CFG table=nat:98 family=2 entries=108 op=nft_register_chain pid=3002 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 11 00:47:43.365000 audit[3002]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=50220 a0=3 a1=ffffe0a35bd0 a2=0 a3=1 items=0 ppid=1622 pid=3002 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 11 00:47:43.365000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 11 00:47:44.078519 kubelet[1454]: E0711 00:47:44.078478 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 11 00:47:45.079055 kubelet[1454]: E0711 00:47:45.078997 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 11 00:47:46.080088 kubelet[1454]: E0711 00:47:46.080039 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 11 00:47:46.977646 update_engine[1208]: I0711 00:47:46.977566 1208 update_attempter.cc:509] Updating boot flags... Jul 11 00:47:47.082093 kubelet[1454]: E0711 00:47:47.082056 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 11 00:47:47.686658 systemd[1]: Created slice kubepods-besteffort-pod53c850fc_0675_4b42_8469_4cbe1223a5e4.slice. Jul 11 00:47:47.783585 kubelet[1454]: I0711 00:47:47.783456 1454 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"pvc-15d8205b-7949-4042-a4e7-a45d6df9d951\" (UniqueName: \"kubernetes.io/nfs/53c850fc-0675-4b42-8469-4cbe1223a5e4-pvc-15d8205b-7949-4042-a4e7-a45d6df9d951\") pod \"test-pod-1\" (UID: \"53c850fc-0675-4b42-8469-4cbe1223a5e4\") " pod="default/test-pod-1" Jul 11 00:47:47.783585 kubelet[1454]: I0711 00:47:47.783521 1454 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-fp5nd\" (UniqueName: \"kubernetes.io/projected/53c850fc-0675-4b42-8469-4cbe1223a5e4-kube-api-access-fp5nd\") pod \"test-pod-1\" (UID: \"53c850fc-0675-4b42-8469-4cbe1223a5e4\") " pod="default/test-pod-1" Jul 11 00:47:47.902741 kernel: Failed to create system directory netfs Jul 11 00:47:47.902845 kernel: kauditd_printk_skb: 68 callbacks suppressed Jul 11 00:47:47.902864 kernel: audit: type=1400 audit(1752194867.899:816): avc: denied { confidentiality } for pid=3024 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 11 00:47:47.902887 kernel: Failed to create system directory netfs Jul 11 00:47:47.902914 kernel: audit: type=1400 audit(1752194867.899:816): avc: denied { confidentiality } for pid=3024 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 11 00:47:47.899000 audit[3024]: AVC avc: denied { confidentiality } for pid=3024 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 11 00:47:47.899000 audit[3024]: AVC avc: denied { confidentiality } for pid=3024 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 11 00:47:47.899000 audit[3024]: AVC avc: denied { confidentiality } for pid=3024 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 11 00:47:47.908386 kernel: Failed to create system directory netfs Jul 11 00:47:47.908420 kernel: audit: type=1400 audit(1752194867.899:816): avc: denied { confidentiality } for pid=3024 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 11 00:47:47.908448 kernel: Failed to create system directory netfs Jul 11 00:47:47.899000 audit[3024]: AVC avc: denied { confidentiality } for pid=3024 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 11 00:47:47.911527 kernel: audit: type=1400 audit(1752194867.899:816): avc: denied { confidentiality } for pid=3024 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 11 00:47:47.899000 audit[3024]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=aaab23be65e0 a1=12c14 a2=aaaae661e028 a3=aaab23bd7010 items=0 ppid=698 pid=3024 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 11 00:47:47.918782 kernel: audit: type=1300 audit(1752194867.899:816): arch=c00000b7 syscall=105 success=yes exit=0 a0=aaab23be65e0 a1=12c14 a2=aaaae661e028 a3=aaab23bd7010 items=0 ppid=698 pid=3024 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 11 00:47:47.918829 kernel: audit: type=1327 audit(1752194867.899:816): proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Jul 11 00:47:47.899000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Jul 11 00:47:47.916000 audit[3024]: AVC avc: denied { confidentiality } for pid=3024 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 11 00:47:47.924586 kernel: Failed to create system directory fscache Jul 11 00:47:47.924628 kernel: audit: type=1400 audit(1752194867.916:817): avc: denied { confidentiality } for pid=3024 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 11 00:47:47.924649 kernel: Failed to create system directory fscache Jul 11 00:47:47.924668 kernel: audit: type=1400 audit(1752194867.916:817): avc: denied { confidentiality } for pid=3024 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 11 00:47:47.916000 audit[3024]: AVC avc: denied { confidentiality } for pid=3024 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 11 00:47:47.927689 kernel: Failed to create system directory fscache Jul 11 00:47:47.927740 kernel: audit: type=1400 audit(1752194867.916:817): avc: denied { confidentiality } for pid=3024 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 11 00:47:47.916000 audit[3024]: AVC avc: denied { confidentiality } for pid=3024 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 11 00:47:47.930798 kernel: Failed to create system directory fscache Jul 11 00:47:47.930846 kernel: audit: type=1400 audit(1752194867.916:817): avc: denied { confidentiality } for pid=3024 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 11 00:47:47.916000 audit[3024]: AVC avc: denied { confidentiality } for pid=3024 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 11 00:47:47.933970 kernel: Failed to create system directory fscache Jul 11 00:47:47.916000 audit[3024]: AVC avc: denied { confidentiality } for pid=3024 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 11 00:47:47.916000 audit[3024]: AVC avc: denied { confidentiality } for pid=3024 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 11 00:47:47.935146 kernel: Failed to create system directory fscache Jul 11 00:47:47.935172 kernel: Failed to create system directory fscache Jul 11 00:47:47.916000 audit[3024]: AVC avc: denied { confidentiality } for pid=3024 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 11 00:47:47.916000 audit[3024]: AVC avc: denied { confidentiality } for pid=3024 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 11 00:47:47.936290 kernel: Failed to create system directory fscache Jul 11 00:47:47.936324 kernel: Failed to create system directory fscache Jul 11 00:47:47.916000 audit[3024]: AVC avc: denied { confidentiality } for pid=3024 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 11 00:47:47.916000 audit[3024]: AVC avc: denied { confidentiality } for pid=3024 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 11 00:47:47.937671 kernel: Failed to create system directory fscache Jul 11 00:47:47.937719 kernel: Failed to create system directory fscache Jul 11 00:47:47.916000 audit[3024]: AVC avc: denied { confidentiality } for pid=3024 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 11 00:47:47.916000 audit[3024]: AVC avc: denied { confidentiality } for pid=3024 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 11 00:47:47.916000 audit[3024]: AVC avc: denied { confidentiality } for pid=3024 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 11 00:47:47.939696 kernel: Failed to create system directory fscache Jul 11 00:47:47.939724 kernel: Failed to create system directory fscache Jul 11 00:47:47.939751 kernel: Failed to create system directory fscache Jul 11 00:47:47.916000 audit[3024]: AVC avc: denied { confidentiality } for pid=3024 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 11 00:47:47.943166 kernel: FS-Cache: Loaded Jul 11 00:47:47.916000 audit[3024]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=aaab23df9210 a1=4c344 a2=aaaae661e028 a3=aaab23bd7010 items=0 ppid=698 pid=3024 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 11 00:47:47.916000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Jul 11 00:47:47.958000 audit[3024]: AVC avc: denied { confidentiality } for pid=3024 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 11 00:47:47.958000 audit[3024]: AVC avc: denied { confidentiality } for pid=3024 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 11 00:47:47.958000 audit[3024]: AVC avc: denied { confidentiality } for pid=3024 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 11 00:47:47.966443 kernel: Failed to create system directory sunrpc Jul 11 00:47:47.966478 kernel: Failed to create system directory sunrpc Jul 11 00:47:47.966497 kernel: Failed to create system directory sunrpc Jul 11 00:47:47.958000 audit[3024]: AVC avc: denied { confidentiality } for pid=3024 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 11 00:47:47.967126 kernel: Failed to create system directory sunrpc Jul 11 00:47:47.958000 audit[3024]: AVC avc: denied { confidentiality } for pid=3024 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 11 00:47:47.958000 audit[3024]: AVC avc: denied { confidentiality } for pid=3024 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 11 00:47:47.968405 kernel: Failed to create system directory sunrpc Jul 11 00:47:47.968439 kernel: Failed to create system directory sunrpc Jul 11 00:47:47.958000 audit[3024]: AVC avc: denied { confidentiality } for pid=3024 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 11 00:47:47.958000 audit[3024]: AVC avc: denied { confidentiality } for pid=3024 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 11 00:47:47.969659 kernel: Failed to create system directory sunrpc Jul 11 00:47:47.969687 kernel: Failed to create system directory sunrpc Jul 11 00:47:47.958000 audit[3024]: AVC avc: denied { confidentiality } for pid=3024 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 11 00:47:47.970327 kernel: Failed to create system directory sunrpc Jul 11 00:47:47.970357 kernel: Failed to create system directory sunrpc Jul 11 00:47:47.958000 audit[3024]: AVC avc: denied { confidentiality } for pid=3024 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 11 00:47:47.958000 audit[3024]: AVC avc: denied { confidentiality } for pid=3024 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 11 00:47:47.971577 kernel: Failed to create system directory sunrpc Jul 11 00:47:47.971619 kernel: Failed to create system directory sunrpc Jul 11 00:47:47.958000 audit[3024]: AVC avc: denied { confidentiality } for pid=3024 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 11 00:47:47.958000 audit[3024]: AVC avc: denied { confidentiality } for pid=3024 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 11 00:47:47.958000 audit[3024]: AVC avc: denied { confidentiality } for pid=3024 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 11 00:47:47.973342 kernel: Failed to create system directory sunrpc Jul 11 00:47:47.973371 kernel: Failed to create system directory sunrpc Jul 11 00:47:47.973395 kernel: Failed to create system directory sunrpc Jul 11 00:47:47.958000 audit[3024]: AVC avc: denied { confidentiality } for pid=3024 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 11 00:47:47.958000 audit[3024]: AVC avc: denied { confidentiality } for pid=3024 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 11 00:47:47.974555 kernel: Failed to create system directory sunrpc Jul 11 00:47:47.974595 kernel: Failed to create system directory sunrpc Jul 11 00:47:47.958000 audit[3024]: AVC avc: denied { confidentiality } for pid=3024 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 11 00:47:47.958000 audit[3024]: AVC avc: denied { confidentiality } for pid=3024 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 11 00:47:47.958000 audit[3024]: AVC avc: denied { confidentiality } for pid=3024 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 11 00:47:47.976356 kernel: Failed to create system directory sunrpc Jul 11 00:47:47.976392 kernel: Failed to create system directory sunrpc Jul 11 00:47:47.976415 kernel: Failed to create system directory sunrpc Jul 11 00:47:47.958000 audit[3024]: AVC avc: denied { confidentiality } for pid=3024 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 11 00:47:47.958000 audit[3024]: AVC avc: denied { confidentiality } for pid=3024 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 11 00:47:47.977557 kernel: Failed to create system directory sunrpc Jul 11 00:47:47.958000 audit[3024]: AVC avc: denied { confidentiality } for pid=3024 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 11 00:47:47.978195 kernel: Failed to create system directory sunrpc Jul 11 00:47:47.978231 kernel: Failed to create system directory sunrpc Jul 11 00:47:47.958000 audit[3024]: AVC avc: denied { confidentiality } for pid=3024 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 11 00:47:47.958000 audit[3024]: AVC avc: denied { confidentiality } for pid=3024 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 11 00:47:47.979497 kernel: Failed to create system directory sunrpc Jul 11 00:47:47.979548 kernel: Failed to create system directory sunrpc Jul 11 00:47:47.958000 audit[3024]: AVC avc: denied { confidentiality } for pid=3024 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 11 00:47:47.958000 audit[3024]: AVC avc: denied { confidentiality } for pid=3024 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 11 00:47:47.958000 audit[3024]: AVC avc: denied { confidentiality } for pid=3024 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 11 00:47:47.981572 kernel: Failed to create system directory sunrpc Jul 11 00:47:47.981670 kernel: Failed to create system directory sunrpc Jul 11 00:47:47.981695 kernel: Failed to create system directory sunrpc Jul 11 00:47:47.958000 audit[3024]: AVC avc: denied { confidentiality } for pid=3024 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 11 00:47:47.958000 audit[3024]: AVC avc: denied { confidentiality } for pid=3024 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 11 00:47:47.958000 audit[3024]: AVC avc: denied { confidentiality } for pid=3024 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 11 00:47:47.983557 kernel: Failed to create system directory sunrpc Jul 11 00:47:47.983599 kernel: Failed to create system directory sunrpc Jul 11 00:47:47.983627 kernel: Failed to create system directory sunrpc Jul 11 00:47:47.958000 audit[3024]: AVC avc: denied { confidentiality } for pid=3024 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 11 00:47:47.958000 audit[3024]: AVC avc: denied { confidentiality } for pid=3024 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 11 00:47:47.958000 audit[3024]: AVC avc: denied { confidentiality } for pid=3024 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 11 00:47:47.985356 kernel: Failed to create system directory sunrpc Jul 11 00:47:47.985389 kernel: Failed to create system directory sunrpc Jul 11 00:47:47.958000 audit[3024]: AVC avc: denied { confidentiality } for pid=3024 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 11 00:47:47.958000 audit[3024]: AVC avc: denied { confidentiality } for pid=3024 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 11 00:47:47.986592 kernel: Failed to create system directory sunrpc Jul 11 00:47:47.986630 kernel: Failed to create system directory sunrpc Jul 11 00:47:47.986645 kernel: Failed to create system directory sunrpc Jul 11 00:47:47.958000 audit[3024]: AVC avc: denied { confidentiality } for pid=3024 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 11 00:47:47.958000 audit[3024]: AVC avc: denied { confidentiality } for pid=3024 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 11 00:47:47.958000 audit[3024]: AVC avc: denied { confidentiality } for pid=3024 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 11 00:47:47.988393 kernel: Failed to create system directory sunrpc Jul 11 00:47:47.988420 kernel: Failed to create system directory sunrpc Jul 11 00:47:47.988448 kernel: Failed to create system directory sunrpc Jul 11 00:47:47.958000 audit[3024]: AVC avc: denied { confidentiality } for pid=3024 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 11 00:47:47.958000 audit[3024]: AVC avc: denied { confidentiality } for pid=3024 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 11 00:47:47.989650 kernel: Failed to create system directory sunrpc Jul 11 00:47:47.958000 audit[3024]: AVC avc: denied { confidentiality } for pid=3024 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 11 00:47:47.990304 kernel: Failed to create system directory sunrpc Jul 11 00:47:47.990338 kernel: Failed to create system directory sunrpc Jul 11 00:47:47.958000 audit[3024]: AVC avc: denied { confidentiality } for pid=3024 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 11 00:47:47.958000 audit[3024]: AVC avc: denied { confidentiality } for pid=3024 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 11 00:47:47.991539 kernel: Failed to create system directory sunrpc Jul 11 00:47:47.991572 kernel: Failed to create system directory sunrpc Jul 11 00:47:47.958000 audit[3024]: AVC avc: denied { confidentiality } for pid=3024 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 11 00:47:47.958000 audit[3024]: AVC avc: denied { confidentiality } for pid=3024 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 11 00:47:47.992699 kernel: Failed to create system directory sunrpc Jul 11 00:47:47.992731 kernel: Failed to create system directory sunrpc Jul 11 00:47:47.958000 audit[3024]: AVC avc: denied { confidentiality } for pid=3024 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 11 00:47:47.958000 audit[3024]: AVC avc: denied { confidentiality } for pid=3024 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 11 00:47:47.958000 audit[3024]: AVC avc: denied { confidentiality } for pid=3024 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 11 00:47:47.994439 kernel: Failed to create system directory sunrpc Jul 11 00:47:47.994478 kernel: Failed to create system directory sunrpc Jul 11 00:47:47.994496 kernel: Failed to create system directory sunrpc Jul 11 00:47:47.958000 audit[3024]: AVC avc: denied { confidentiality } for pid=3024 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 11 00:47:47.958000 audit[3024]: AVC avc: denied { confidentiality } for pid=3024 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 11 00:47:47.995616 kernel: Failed to create system directory sunrpc Jul 11 00:47:47.958000 audit[3024]: AVC avc: denied { confidentiality } for pid=3024 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 11 00:47:47.996218 kernel: Failed to create system directory sunrpc Jul 11 00:47:47.996255 kernel: Failed to create system directory sunrpc Jul 11 00:47:47.958000 audit[3024]: AVC avc: denied { confidentiality } for pid=3024 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 11 00:47:47.958000 audit[3024]: AVC avc: denied { confidentiality } for pid=3024 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 11 00:47:47.997365 kernel: Failed to create system directory sunrpc Jul 11 00:47:47.997399 kernel: Failed to create system directory sunrpc Jul 11 00:47:47.958000 audit[3024]: AVC avc: denied { confidentiality } for pid=3024 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 11 00:47:47.958000 audit[3024]: AVC avc: denied { confidentiality } for pid=3024 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 11 00:47:47.998528 kernel: Failed to create system directory sunrpc Jul 11 00:47:47.998556 kernel: Failed to create system directory sunrpc Jul 11 00:47:47.958000 audit[3024]: AVC avc: denied { confidentiality } for pid=3024 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 11 00:47:47.958000 audit[3024]: AVC avc: denied { confidentiality } for pid=3024 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 11 00:47:47.999701 kernel: Failed to create system directory sunrpc Jul 11 00:47:47.999732 kernel: Failed to create system directory sunrpc Jul 11 00:47:47.958000 audit[3024]: AVC avc: denied { confidentiality } for pid=3024 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 11 00:47:47.958000 audit[3024]: AVC avc: denied { confidentiality } for pid=3024 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 11 00:47:47.958000 audit[3024]: AVC avc: denied { confidentiality } for pid=3024 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 11 00:47:48.001473 kernel: Failed to create system directory sunrpc Jul 11 00:47:48.001512 kernel: Failed to create system directory sunrpc Jul 11 00:47:48.001526 kernel: Failed to create system directory sunrpc Jul 11 00:47:47.958000 audit[3024]: AVC avc: denied { confidentiality } for pid=3024 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 11 00:47:47.958000 audit[3024]: AVC avc: denied { confidentiality } for pid=3024 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 11 00:47:48.002627 kernel: Failed to create system directory sunrpc Jul 11 00:47:48.002662 kernel: Failed to create system directory sunrpc Jul 11 00:47:47.958000 audit[3024]: AVC avc: denied { confidentiality } for pid=3024 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 11 00:47:47.958000 audit[3024]: AVC avc: denied { confidentiality } for pid=3024 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 11 00:47:47.958000 audit[3024]: AVC avc: denied { confidentiality } for pid=3024 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 11 00:47:48.004322 kernel: Failed to create system directory sunrpc Jul 11 00:47:48.004357 kernel: Failed to create system directory sunrpc Jul 11 00:47:48.004378 kernel: Failed to create system directory sunrpc Jul 11 00:47:47.958000 audit[3024]: AVC avc: denied { confidentiality } for pid=3024 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 11 00:47:47.958000 audit[3024]: AVC avc: denied { confidentiality } for pid=3024 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 11 00:47:48.005527 kernel: Failed to create system directory sunrpc Jul 11 00:47:48.005552 kernel: Failed to create system directory sunrpc Jul 11 00:47:47.958000 audit[3024]: AVC avc: denied { confidentiality } for pid=3024 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 11 00:47:47.958000 audit[3024]: AVC avc: denied { confidentiality } for pid=3024 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 11 00:47:48.006689 kernel: Failed to create system directory sunrpc Jul 11 00:47:48.006714 kernel: Failed to create system directory sunrpc Jul 11 00:47:47.958000 audit[3024]: AVC avc: denied { confidentiality } for pid=3024 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 11 00:47:47.958000 audit[3024]: AVC avc: denied { confidentiality } for pid=3024 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 11 00:47:47.958000 audit[3024]: AVC avc: denied { confidentiality } for pid=3024 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 11 00:47:48.008483 kernel: Failed to create system directory sunrpc Jul 11 00:47:48.008513 kernel: Failed to create system directory sunrpc Jul 11 00:47:48.008527 kernel: Failed to create system directory sunrpc Jul 11 00:47:47.958000 audit[3024]: AVC avc: denied { confidentiality } for pid=3024 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 11 00:47:47.958000 audit[3024]: AVC avc: denied { confidentiality } for pid=3024 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 11 00:47:48.009640 kernel: Failed to create system directory sunrpc Jul 11 00:47:48.009675 kernel: Failed to create system directory sunrpc Jul 11 00:47:47.958000 audit[3024]: AVC avc: denied { confidentiality } for pid=3024 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 11 00:47:47.958000 audit[3024]: AVC avc: denied { confidentiality } for pid=3024 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 11 00:47:47.958000 audit[3024]: AVC avc: denied { confidentiality } for pid=3024 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 11 00:47:48.011412 kernel: Failed to create system directory sunrpc Jul 11 00:47:48.011437 kernel: Failed to create system directory sunrpc Jul 11 00:47:48.011458 kernel: Failed to create system directory sunrpc Jul 11 00:47:47.958000 audit[3024]: AVC avc: denied { confidentiality } for pid=3024 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 11 00:47:47.958000 audit[3024]: AVC avc: denied { confidentiality } for pid=3024 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 11 00:47:48.012558 kernel: Failed to create system directory sunrpc Jul 11 00:47:48.012583 kernel: Failed to create system directory sunrpc Jul 11 00:47:47.958000 audit[3024]: AVC avc: denied { confidentiality } for pid=3024 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 11 00:47:47.958000 audit[3024]: AVC avc: denied { confidentiality } for pid=3024 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 11 00:47:47.958000 audit[3024]: AVC avc: denied { confidentiality } for pid=3024 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 11 00:47:48.014321 kernel: Failed to create system directory sunrpc Jul 11 00:47:48.014359 kernel: Failed to create system directory sunrpc Jul 11 00:47:48.014373 kernel: Failed to create system directory sunrpc Jul 11 00:47:47.958000 audit[3024]: AVC avc: denied { confidentiality } for pid=3024 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 11 00:47:47.958000 audit[3024]: AVC avc: denied { confidentiality } for pid=3024 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 11 00:47:48.015500 kernel: Failed to create system directory sunrpc Jul 11 00:47:48.015534 kernel: Failed to create system directory sunrpc Jul 11 00:47:47.958000 audit[3024]: AVC avc: denied { confidentiality } for pid=3024 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 11 00:47:47.958000 audit[3024]: AVC avc: denied { confidentiality } for pid=3024 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 11 00:47:48.016678 kernel: Failed to create system directory sunrpc Jul 11 00:47:48.016716 kernel: Failed to create system directory sunrpc Jul 11 00:47:47.958000 audit[3024]: AVC avc: denied { confidentiality } for pid=3024 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 11 00:47:48.017241 kernel: Failed to create system directory sunrpc Jul 11 00:47:47.958000 audit[3024]: AVC avc: denied { confidentiality } for pid=3024 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 11 00:47:47.958000 audit[3024]: AVC avc: denied { confidentiality } for pid=3024 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 11 00:47:48.018415 kernel: Failed to create system directory sunrpc Jul 11 00:47:48.018456 kernel: Failed to create system directory sunrpc Jul 11 00:47:47.958000 audit[3024]: AVC avc: denied { confidentiality } for pid=3024 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 11 00:47:47.958000 audit[3024]: AVC avc: denied { confidentiality } for pid=3024 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 11 00:47:48.019576 kernel: Failed to create system directory sunrpc Jul 11 00:47:47.958000 audit[3024]: AVC avc: denied { confidentiality } for pid=3024 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 11 00:47:48.020217 kernel: Failed to create system directory sunrpc Jul 11 00:47:47.958000 audit[3024]: AVC avc: denied { confidentiality } for pid=3024 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 11 00:47:47.958000 audit[3024]: AVC avc: denied { confidentiality } for pid=3024 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 11 00:47:48.021437 kernel: Failed to create system directory sunrpc Jul 11 00:47:48.021474 kernel: Failed to create system directory sunrpc Jul 11 00:47:48.021491 kernel: Failed to create system directory sunrpc Jul 11 00:47:47.958000 audit[3024]: AVC avc: denied { confidentiality } for pid=3024 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 11 00:47:47.958000 audit[3024]: AVC avc: denied { confidentiality } for pid=3024 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 11 00:47:48.022644 kernel: Failed to create system directory sunrpc Jul 11 00:47:48.022684 kernel: Failed to create system directory sunrpc Jul 11 00:47:47.958000 audit[3024]: AVC avc: denied { confidentiality } for pid=3024 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 11 00:47:47.958000 audit[3024]: AVC avc: denied { confidentiality } for pid=3024 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 11 00:47:47.958000 audit[3024]: AVC avc: denied { confidentiality } for pid=3024 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 11 00:47:48.024428 kernel: Failed to create system directory sunrpc Jul 11 00:47:48.024464 kernel: Failed to create system directory sunrpc Jul 11 00:47:47.958000 audit[3024]: AVC avc: denied { confidentiality } for pid=3024 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 11 00:47:47.958000 audit[3024]: AVC avc: denied { confidentiality } for pid=3024 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 11 00:47:48.025666 kernel: Failed to create system directory sunrpc Jul 11 00:47:48.025688 kernel: Failed to create system directory sunrpc Jul 11 00:47:48.025704 kernel: Failed to create system directory sunrpc Jul 11 00:47:47.958000 audit[3024]: AVC avc: denied { confidentiality } for pid=3024 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 11 00:47:47.958000 audit[3024]: AVC avc: denied { confidentiality } for pid=3024 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 11 00:47:47.958000 audit[3024]: AVC avc: denied { confidentiality } for pid=3024 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 11 00:47:48.027452 kernel: Failed to create system directory sunrpc Jul 11 00:47:48.027482 kernel: Failed to create system directory sunrpc Jul 11 00:47:48.027500 kernel: Failed to create system directory sunrpc Jul 11 00:47:47.958000 audit[3024]: AVC avc: denied { confidentiality } for pid=3024 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 11 00:47:47.958000 audit[3024]: AVC avc: denied { confidentiality } for pid=3024 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 11 00:47:48.028644 kernel: Failed to create system directory sunrpc Jul 11 00:47:47.958000 audit[3024]: AVC avc: denied { confidentiality } for pid=3024 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 11 00:47:48.029265 kernel: Failed to create system directory sunrpc Jul 11 00:47:47.958000 audit[3024]: AVC avc: denied { confidentiality } for pid=3024 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 11 00:47:47.958000 audit[3024]: AVC avc: denied { confidentiality } for pid=3024 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 11 00:47:48.030439 kernel: Failed to create system directory sunrpc Jul 11 00:47:48.030459 kernel: Failed to create system directory sunrpc Jul 11 00:47:48.030484 kernel: Failed to create system directory sunrpc Jul 11 00:47:47.958000 audit[3024]: AVC avc: denied { confidentiality } for pid=3024 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 11 00:47:47.958000 audit[3024]: AVC avc: denied { confidentiality } for pid=3024 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 11 00:47:48.031678 kernel: Failed to create system directory sunrpc Jul 11 00:47:47.958000 audit[3024]: AVC avc: denied { confidentiality } for pid=3024 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 11 00:47:48.032286 kernel: Failed to create system directory sunrpc Jul 11 00:47:47.958000 audit[3024]: AVC avc: denied { confidentiality } for pid=3024 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 11 00:47:47.958000 audit[3024]: AVC avc: denied { confidentiality } for pid=3024 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 11 00:47:48.033471 kernel: Failed to create system directory sunrpc Jul 11 00:47:48.033501 kernel: Failed to create system directory sunrpc Jul 11 00:47:48.033519 kernel: Failed to create system directory sunrpc Jul 11 00:47:47.958000 audit[3024]: AVC avc: denied { confidentiality } for pid=3024 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 11 00:47:47.958000 audit[3024]: AVC avc: denied { confidentiality } for pid=3024 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 11 00:47:48.034669 kernel: Failed to create system directory sunrpc Jul 11 00:47:47.958000 audit[3024]: AVC avc: denied { confidentiality } for pid=3024 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 11 00:47:48.035285 kernel: Failed to create system directory sunrpc Jul 11 00:47:47.958000 audit[3024]: AVC avc: denied { confidentiality } for pid=3024 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 11 00:47:47.958000 audit[3024]: AVC avc: denied { confidentiality } for pid=3024 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 11 00:47:48.036509 kernel: Failed to create system directory sunrpc Jul 11 00:47:48.036535 kernel: Failed to create system directory sunrpc Jul 11 00:47:48.036564 kernel: Failed to create system directory sunrpc Jul 11 00:47:47.958000 audit[3024]: AVC avc: denied { confidentiality } for pid=3024 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 11 00:47:48.037129 kernel: Failed to create system directory sunrpc Jul 11 00:47:47.958000 audit[3024]: AVC avc: denied { confidentiality } for pid=3024 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 11 00:47:47.958000 audit[3024]: AVC avc: denied { confidentiality } for pid=3024 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 11 00:47:48.038322 kernel: Failed to create system directory sunrpc Jul 11 00:47:47.958000 audit[3024]: AVC avc: denied { confidentiality } for pid=3024 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 11 00:47:47.958000 audit[3024]: AVC avc: denied { confidentiality } for pid=3024 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 11 00:47:48.039511 kernel: Failed to create system directory sunrpc Jul 11 00:47:48.039539 kernel: Failed to create system directory sunrpc Jul 11 00:47:47.958000 audit[3024]: AVC avc: denied { confidentiality } for pid=3024 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 11 00:47:48.040141 kernel: Failed to create system directory sunrpc Jul 11 00:47:47.958000 audit[3024]: AVC avc: denied { confidentiality } for pid=3024 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 11 00:47:48.041124 kernel: Failed to create system directory sunrpc Jul 11 00:47:48.048354 kernel: RPC: Registered named UNIX socket transport module. Jul 11 00:47:48.048393 kernel: RPC: Registered udp transport module. Jul 11 00:47:48.048425 kernel: RPC: Registered tcp transport module. Jul 11 00:47:48.049661 kernel: RPC: Registered tcp NFSv4.1 backchannel transport module. Jul 11 00:47:47.958000 audit[3024]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=aaab23e45560 a1=14a74c a2=aaaae661e028 a3=aaab23bd7010 items=6 ppid=698 pid=3024 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 11 00:47:47.958000 audit: CWD cwd="/" Jul 11 00:47:47.958000 audit: PATH item=0 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 11 00:47:47.958000 audit: PATH item=1 name=(null) inode=17318 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 11 00:47:47.958000 audit: PATH item=2 name=(null) inode=17318 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 11 00:47:47.958000 audit: PATH item=3 name=(null) inode=17319 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 11 00:47:47.958000 audit: PATH item=4 name=(null) inode=17318 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 11 00:47:47.958000 audit: PATH item=5 name=(null) inode=17320 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 11 00:47:47.958000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Jul 11 00:47:48.056880 kubelet[1454]: E0711 00:47:48.056839 1454 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 11 00:47:48.073000 audit[3024]: AVC avc: denied { confidentiality } for pid=3024 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 11 00:47:48.073000 audit[3024]: AVC avc: denied { confidentiality } for pid=3024 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 11 00:47:48.079596 kernel: Failed to create system directory nfs Jul 11 00:47:48.079645 kernel: Failed to create system directory nfs Jul 11 00:47:48.079667 kernel: Failed to create system directory nfs Jul 11 00:47:48.073000 audit[3024]: AVC avc: denied { confidentiality } for pid=3024 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 11 00:47:48.073000 audit[3024]: AVC avc: denied { confidentiality } for pid=3024 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 11 00:47:48.073000 audit[3024]: AVC avc: denied { confidentiality } for pid=3024 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 11 00:47:48.081398 kernel: Failed to create system directory nfs Jul 11 00:47:48.081426 kernel: Failed to create system directory nfs Jul 11 00:47:48.081454 kernel: Failed to create system directory nfs Jul 11 00:47:48.073000 audit[3024]: AVC avc: denied { confidentiality } for pid=3024 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 11 00:47:48.073000 audit[3024]: AVC avc: denied { confidentiality } for pid=3024 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 11 00:47:48.082503 kubelet[1454]: E0711 00:47:48.082470 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 11 00:47:48.082732 kernel: Failed to create system directory nfs Jul 11 00:47:48.082750 kernel: Failed to create system directory nfs Jul 11 00:47:48.073000 audit[3024]: AVC avc: denied { confidentiality } for pid=3024 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 11 00:47:48.083141 kernel: Failed to create system directory nfs Jul 11 00:47:48.073000 audit[3024]: AVC avc: denied { confidentiality } for pid=3024 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 11 00:47:48.073000 audit[3024]: AVC avc: denied { confidentiality } for pid=3024 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 11 00:47:48.084243 kernel: Failed to create system directory nfs Jul 11 00:47:48.073000 audit[3024]: AVC avc: denied { confidentiality } for pid=3024 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 11 00:47:48.073000 audit[3024]: AVC avc: denied { confidentiality } for pid=3024 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 11 00:47:48.085378 kernel: Failed to create system directory nfs Jul 11 00:47:48.085416 kernel: Failed to create system directory nfs Jul 11 00:47:48.073000 audit[3024]: AVC avc: denied { confidentiality } for pid=3024 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 11 00:47:48.073000 audit[3024]: AVC avc: denied { confidentiality } for pid=3024 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 11 00:47:48.086575 kernel: Failed to create system directory nfs Jul 11 00:47:48.086602 kernel: Failed to create system directory nfs Jul 11 00:47:48.073000 audit[3024]: AVC avc: denied { confidentiality } for pid=3024 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 11 00:47:48.087197 kernel: Failed to create system directory nfs Jul 11 00:47:48.073000 audit[3024]: AVC avc: denied { confidentiality } for pid=3024 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 11 00:47:48.073000 audit[3024]: AVC avc: denied { confidentiality } for pid=3024 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 11 00:47:48.088351 kernel: Failed to create system directory nfs Jul 11 00:47:48.088385 kernel: Failed to create system directory nfs Jul 11 00:47:48.088408 kernel: Failed to create system directory nfs Jul 11 00:47:48.073000 audit[3024]: AVC avc: denied { confidentiality } for pid=3024 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 11 00:47:48.073000 audit[3024]: AVC avc: denied { confidentiality } for pid=3024 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 11 00:47:48.089482 kernel: Failed to create system directory nfs Jul 11 00:47:48.073000 audit[3024]: AVC avc: denied { confidentiality } for pid=3024 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 11 00:47:48.073000 audit[3024]: AVC avc: denied { confidentiality } for pid=3024 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 11 00:47:48.090635 kernel: Failed to create system directory nfs Jul 11 00:47:48.090659 kernel: Failed to create system directory nfs Jul 11 00:47:48.073000 audit[3024]: AVC avc: denied { confidentiality } for pid=3024 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 11 00:47:48.091274 kernel: Failed to create system directory nfs Jul 11 00:47:48.073000 audit[3024]: AVC avc: denied { confidentiality } for pid=3024 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 11 00:47:48.073000 audit[3024]: AVC avc: denied { confidentiality } for pid=3024 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 11 00:47:48.092393 kernel: Failed to create system directory nfs Jul 11 00:47:48.092426 kernel: Failed to create system directory nfs Jul 11 00:47:48.092449 kernel: Failed to create system directory nfs Jul 11 00:47:48.073000 audit[3024]: AVC avc: denied { confidentiality } for pid=3024 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 11 00:47:48.073000 audit[3024]: AVC avc: denied { confidentiality } for pid=3024 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 11 00:47:48.093527 kernel: Failed to create system directory nfs Jul 11 00:47:48.073000 audit[3024]: AVC avc: denied { confidentiality } for pid=3024 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 11 00:47:48.094152 kernel: Failed to create system directory nfs Jul 11 00:47:48.073000 audit[3024]: AVC avc: denied { confidentiality } for pid=3024 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 11 00:47:48.073000 audit[3024]: AVC avc: denied { confidentiality } for pid=3024 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 11 00:47:48.095270 kernel: Failed to create system directory nfs Jul 11 00:47:48.095297 kernel: Failed to create system directory nfs Jul 11 00:47:48.073000 audit[3024]: AVC avc: denied { confidentiality } for pid=3024 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 11 00:47:48.073000 audit[3024]: AVC avc: denied { confidentiality } for pid=3024 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 11 00:47:48.096443 kernel: Failed to create system directory nfs Jul 11 00:47:48.096480 kernel: Failed to create system directory nfs Jul 11 00:47:48.096495 kernel: Failed to create system directory nfs Jul 11 00:47:48.073000 audit[3024]: AVC avc: denied { confidentiality } for pid=3024 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 11 00:47:48.073000 audit[3024]: AVC avc: denied { confidentiality } for pid=3024 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 11 00:47:48.097542 kernel: Failed to create system directory nfs Jul 11 00:47:48.097574 kernel: Failed to create system directory nfs Jul 11 00:47:48.073000 audit[3024]: AVC avc: denied { confidentiality } for pid=3024 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 11 00:47:48.073000 audit[3024]: AVC avc: denied { confidentiality } for pid=3024 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 11 00:47:48.098648 kernel: Failed to create system directory nfs Jul 11 00:47:48.098696 kernel: Failed to create system directory nfs Jul 11 00:47:48.073000 audit[3024]: AVC avc: denied { confidentiality } for pid=3024 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 11 00:47:48.073000 audit[3024]: AVC avc: denied { confidentiality } for pid=3024 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 11 00:47:48.073000 audit[3024]: AVC avc: denied { confidentiality } for pid=3024 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 11 00:47:48.100395 kernel: Failed to create system directory nfs Jul 11 00:47:48.100493 kernel: Failed to create system directory nfs Jul 11 00:47:48.100514 kernel: Failed to create system directory nfs Jul 11 00:47:48.073000 audit[3024]: AVC avc: denied { confidentiality } for pid=3024 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 11 00:47:48.073000 audit[3024]: AVC avc: denied { confidentiality } for pid=3024 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 11 00:47:48.101514 kernel: Failed to create system directory nfs Jul 11 00:47:48.101602 kernel: Failed to create system directory nfs Jul 11 00:47:48.073000 audit[3024]: AVC avc: denied { confidentiality } for pid=3024 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 11 00:47:48.073000 audit[3024]: AVC avc: denied { confidentiality } for pid=3024 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 11 00:47:48.102663 kernel: Failed to create system directory nfs Jul 11 00:47:48.102699 kernel: Failed to create system directory nfs Jul 11 00:47:48.073000 audit[3024]: AVC avc: denied { confidentiality } for pid=3024 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 11 00:47:48.073000 audit[3024]: AVC avc: denied { confidentiality } for pid=3024 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 11 00:47:48.073000 audit[3024]: AVC avc: denied { confidentiality } for pid=3024 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 11 00:47:48.104270 kernel: Failed to create system directory nfs Jul 11 00:47:48.104304 kernel: Failed to create system directory nfs Jul 11 00:47:48.073000 audit[3024]: AVC avc: denied { confidentiality } for pid=3024 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 11 00:47:48.073000 audit[3024]: AVC avc: denied { confidentiality } for pid=3024 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 11 00:47:48.105483 kernel: Failed to create system directory nfs Jul 11 00:47:48.105521 kernel: Failed to create system directory nfs Jul 11 00:47:48.105535 kernel: Failed to create system directory nfs Jul 11 00:47:48.073000 audit[3024]: AVC avc: denied { confidentiality } for pid=3024 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 11 00:47:48.073000 audit[3024]: AVC avc: denied { confidentiality } for pid=3024 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 11 00:47:48.106531 kernel: Failed to create system directory nfs Jul 11 00:47:48.106571 kernel: Failed to create system directory nfs Jul 11 00:47:48.073000 audit[3024]: AVC avc: denied { confidentiality } for pid=3024 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 11 00:47:48.073000 audit[3024]: AVC avc: denied { confidentiality } for pid=3024 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 11 00:47:48.107632 kernel: Failed to create system directory nfs Jul 11 00:47:48.107661 kernel: Failed to create system directory nfs Jul 11 00:47:48.073000 audit[3024]: AVC avc: denied { confidentiality } for pid=3024 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 11 00:47:48.073000 audit[3024]: AVC avc: denied { confidentiality } for pid=3024 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 11 00:47:48.073000 audit[3024]: AVC avc: denied { confidentiality } for pid=3024 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 11 00:47:48.109263 kernel: Failed to create system directory nfs Jul 11 00:47:48.109292 kernel: Failed to create system directory nfs Jul 11 00:47:48.109307 kernel: Failed to create system directory nfs Jul 11 00:47:48.073000 audit[3024]: AVC avc: denied { confidentiality } for pid=3024 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 11 00:47:48.073000 audit[3024]: AVC avc: denied { confidentiality } for pid=3024 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 11 00:47:48.110453 kernel: Failed to create system directory nfs Jul 11 00:47:48.110483 kernel: Failed to create system directory nfs Jul 11 00:47:48.073000 audit[3024]: AVC avc: denied { confidentiality } for pid=3024 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 11 00:47:48.073000 audit[3024]: AVC avc: denied { confidentiality } for pid=3024 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 11 00:47:48.111557 kernel: Failed to create system directory nfs Jul 11 00:47:48.111585 kernel: Failed to create system directory nfs Jul 11 00:47:48.073000 audit[3024]: AVC avc: denied { confidentiality } for pid=3024 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 11 00:47:48.112130 kernel: Failed to create system directory nfs Jul 11 00:47:48.073000 audit[3024]: AVC avc: denied { confidentiality } for pid=3024 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 11 00:47:48.127137 kernel: FS-Cache: Netfs 'nfs' registered for caching Jul 11 00:47:48.073000 audit[3024]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=aaab23feea40 a1=116364 a2=aaaae661e028 a3=aaab23bd7010 items=0 ppid=698 pid=3024 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 11 00:47:48.073000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Jul 11 00:47:48.146000 audit[3028]: AVC avc: denied { confidentiality } for pid=3028 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 11 00:47:48.146000 audit[3028]: AVC avc: denied { confidentiality } for pid=3028 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 11 00:47:48.155150 kernel: Failed to create system directory nfs4 Jul 11 00:47:48.146000 audit[3028]: AVC avc: denied { confidentiality } for pid=3028 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 11 00:47:48.156592 kernel: Failed to create system directory nfs4 Jul 11 00:47:48.156660 kernel: Failed to create system directory nfs4 Jul 11 00:47:48.146000 audit[3028]: AVC avc: denied { confidentiality } for pid=3028 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 11 00:47:48.157371 kernel: Failed to create system directory nfs4 Jul 11 00:47:48.157438 kernel: Failed to create system directory nfs4 Jul 11 00:47:48.146000 audit[3028]: AVC avc: denied { confidentiality } for pid=3028 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 11 00:47:48.146000 audit[3028]: AVC avc: denied { confidentiality } for pid=3028 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 11 00:47:48.158569 kernel: Failed to create system directory nfs4 Jul 11 00:47:48.146000 audit[3028]: AVC avc: denied { confidentiality } for pid=3028 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 11 00:47:48.159160 kernel: Failed to create system directory nfs4 Jul 11 00:47:48.146000 audit[3028]: AVC avc: denied { confidentiality } for pid=3028 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 11 00:47:48.146000 audit[3028]: AVC avc: denied { confidentiality } for pid=3028 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 11 00:47:48.160375 kernel: Failed to create system directory nfs4 Jul 11 00:47:48.160409 kernel: Failed to create system directory nfs4 Jul 11 00:47:48.146000 audit[3028]: AVC avc: denied { confidentiality } for pid=3028 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 11 00:47:48.146000 audit[3028]: AVC avc: denied { confidentiality } for pid=3028 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 11 00:47:48.161565 kernel: Failed to create system directory nfs4 Jul 11 00:47:48.161589 kernel: Failed to create system directory nfs4 Jul 11 00:47:48.146000 audit[3028]: AVC avc: denied { confidentiality } for pid=3028 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 11 00:47:48.162168 kernel: Failed to create system directory nfs4 Jul 11 00:47:48.146000 audit[3028]: AVC avc: denied { confidentiality } for pid=3028 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 11 00:47:48.146000 audit[3028]: AVC avc: denied { confidentiality } for pid=3028 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 11 00:47:48.163353 kernel: Failed to create system directory nfs4 Jul 11 00:47:48.163378 kernel: Failed to create system directory nfs4 Jul 11 00:47:48.146000 audit[3028]: AVC avc: denied { confidentiality } for pid=3028 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 11 00:47:48.146000 audit[3028]: AVC avc: denied { confidentiality } for pid=3028 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 11 00:47:48.164568 kernel: Failed to create system directory nfs4 Jul 11 00:47:48.164595 kernel: Failed to create system directory nfs4 Jul 11 00:47:48.146000 audit[3028]: AVC avc: denied { confidentiality } for pid=3028 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 11 00:47:48.165191 kernel: Failed to create system directory nfs4 Jul 11 00:47:48.146000 audit[3028]: AVC avc: denied { confidentiality } for pid=3028 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 11 00:47:48.146000 audit[3028]: AVC avc: denied { confidentiality } for pid=3028 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 11 00:47:48.166401 kernel: Failed to create system directory nfs4 Jul 11 00:47:48.166439 kernel: Failed to create system directory nfs4 Jul 11 00:47:48.146000 audit[3028]: AVC avc: denied { confidentiality } for pid=3028 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 11 00:47:48.146000 audit[3028]: AVC avc: denied { confidentiality } for pid=3028 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 11 00:47:48.167660 kernel: Failed to create system directory nfs4 Jul 11 00:47:48.167681 kernel: Failed to create system directory nfs4 Jul 11 00:47:48.146000 audit[3028]: AVC avc: denied { confidentiality } for pid=3028 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 11 00:47:48.168274 kernel: Failed to create system directory nfs4 Jul 11 00:47:48.146000 audit[3028]: AVC avc: denied { confidentiality } for pid=3028 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 11 00:47:48.146000 audit[3028]: AVC avc: denied { confidentiality } for pid=3028 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 11 00:47:48.169488 kernel: Failed to create system directory nfs4 Jul 11 00:47:48.169512 kernel: Failed to create system directory nfs4 Jul 11 00:47:48.146000 audit[3028]: AVC avc: denied { confidentiality } for pid=3028 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 11 00:47:48.170126 kernel: Failed to create system directory nfs4 Jul 11 00:47:48.146000 audit[3028]: AVC avc: denied { confidentiality } for pid=3028 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 11 00:47:48.146000 audit[3028]: AVC avc: denied { confidentiality } for pid=3028 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 11 00:47:48.171340 kernel: Failed to create system directory nfs4 Jul 11 00:47:48.171366 kernel: Failed to create system directory nfs4 Jul 11 00:47:48.146000 audit[3028]: AVC avc: denied { confidentiality } for pid=3028 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 11 00:47:48.146000 audit[3028]: AVC avc: denied { confidentiality } for pid=3028 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 11 00:47:48.172548 kernel: Failed to create system directory nfs4 Jul 11 00:47:48.172570 kernel: Failed to create system directory nfs4 Jul 11 00:47:48.146000 audit[3028]: AVC avc: denied { confidentiality } for pid=3028 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 11 00:47:48.173156 kernel: Failed to create system directory nfs4 Jul 11 00:47:48.146000 audit[3028]: AVC avc: denied { confidentiality } for pid=3028 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 11 00:47:48.146000 audit[3028]: AVC avc: denied { confidentiality } for pid=3028 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 11 00:47:48.174353 kernel: Failed to create system directory nfs4 Jul 11 00:47:48.174393 kernel: Failed to create system directory nfs4 Jul 11 00:47:48.174415 kernel: Failed to create system directory nfs4 Jul 11 00:47:48.146000 audit[3028]: AVC avc: denied { confidentiality } for pid=3028 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 11 00:47:48.146000 audit[3028]: AVC avc: denied { confidentiality } for pid=3028 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 11 00:47:48.175557 kernel: Failed to create system directory nfs4 Jul 11 00:47:48.146000 audit[3028]: AVC avc: denied { confidentiality } for pid=3028 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 11 00:47:48.176312 kernel: Failed to create system directory nfs4 Jul 11 00:47:48.146000 audit[3028]: AVC avc: denied { confidentiality } for pid=3028 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 11 00:47:48.146000 audit[3028]: AVC avc: denied { confidentiality } for pid=3028 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 11 00:47:48.177490 kernel: Failed to create system directory nfs4 Jul 11 00:47:48.177512 kernel: Failed to create system directory nfs4 Jul 11 00:47:48.146000 audit[3028]: AVC avc: denied { confidentiality } for pid=3028 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 11 00:47:48.146000 audit[3028]: AVC avc: denied { confidentiality } for pid=3028 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 11 00:47:48.178686 kernel: Failed to create system directory nfs4 Jul 11 00:47:48.178705 kernel: Failed to create system directory nfs4 Jul 11 00:47:48.146000 audit[3028]: AVC avc: denied { confidentiality } for pid=3028 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 11 00:47:48.179270 kernel: Failed to create system directory nfs4 Jul 11 00:47:48.146000 audit[3028]: AVC avc: denied { confidentiality } for pid=3028 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 11 00:47:48.146000 audit[3028]: AVC avc: denied { confidentiality } for pid=3028 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 11 00:47:48.180435 kernel: Failed to create system directory nfs4 Jul 11 00:47:48.180467 kernel: Failed to create system directory nfs4 Jul 11 00:47:48.180482 kernel: Failed to create system directory nfs4 Jul 11 00:47:48.146000 audit[3028]: AVC avc: denied { confidentiality } for pid=3028 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 11 00:47:48.146000 audit[3028]: AVC avc: denied { confidentiality } for pid=3028 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 11 00:47:48.181596 kernel: Failed to create system directory nfs4 Jul 11 00:47:48.146000 audit[3028]: AVC avc: denied { confidentiality } for pid=3028 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 11 00:47:48.182168 kernel: Failed to create system directory nfs4 Jul 11 00:47:48.146000 audit[3028]: AVC avc: denied { confidentiality } for pid=3028 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 11 00:47:48.146000 audit[3028]: AVC avc: denied { confidentiality } for pid=3028 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 11 00:47:48.183310 kernel: Failed to create system directory nfs4 Jul 11 00:47:48.183334 kernel: Failed to create system directory nfs4 Jul 11 00:47:48.183348 kernel: Failed to create system directory nfs4 Jul 11 00:47:48.146000 audit[3028]: AVC avc: denied { confidentiality } for pid=3028 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 11 00:47:48.146000 audit[3028]: AVC avc: denied { confidentiality } for pid=3028 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 11 00:47:48.184461 kernel: Failed to create system directory nfs4 Jul 11 00:47:48.184497 kernel: Failed to create system directory nfs4 Jul 11 00:47:48.146000 audit[3028]: AVC avc: denied { confidentiality } for pid=3028 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 11 00:47:48.146000 audit[3028]: AVC avc: denied { confidentiality } for pid=3028 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 11 00:47:48.185606 kernel: Failed to create system directory nfs4 Jul 11 00:47:48.146000 audit[3028]: AVC avc: denied { confidentiality } for pid=3028 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 11 00:47:48.186181 kernel: Failed to create system directory nfs4 Jul 11 00:47:48.146000 audit[3028]: AVC avc: denied { confidentiality } for pid=3028 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 11 00:47:48.146000 audit[3028]: AVC avc: denied { confidentiality } for pid=3028 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 11 00:47:48.187308 kernel: Failed to create system directory nfs4 Jul 11 00:47:48.187329 kernel: Failed to create system directory nfs4 Jul 11 00:47:48.187343 kernel: Failed to create system directory nfs4 Jul 11 00:47:48.146000 audit[3028]: AVC avc: denied { confidentiality } for pid=3028 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 11 00:47:48.146000 audit[3028]: AVC avc: denied { confidentiality } for pid=3028 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 11 00:47:48.188454 kernel: Failed to create system directory nfs4 Jul 11 00:47:48.188498 kernel: Failed to create system directory nfs4 Jul 11 00:47:48.146000 audit[3028]: AVC avc: denied { confidentiality } for pid=3028 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 11 00:47:48.146000 audit[3028]: AVC avc: denied { confidentiality } for pid=3028 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 11 00:47:48.189796 kernel: Failed to create system directory nfs4 Jul 11 00:47:48.146000 audit[3028]: AVC avc: denied { confidentiality } for pid=3028 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 11 00:47:48.190774 kernel: Failed to create system directory nfs4 Jul 11 00:47:48.146000 audit[3028]: AVC avc: denied { confidentiality } for pid=3028 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 11 00:47:48.192098 kernel: Failed to create system directory nfs4 Jul 11 00:47:48.146000 audit[3028]: AVC avc: denied { confidentiality } for pid=3028 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 11 00:47:48.193676 kernel: Failed to create system directory nfs4 Jul 11 00:47:48.193759 kernel: Failed to create system directory nfs4 Jul 11 00:47:48.146000 audit[3028]: AVC avc: denied { confidentiality } for pid=3028 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 11 00:47:48.146000 audit[3028]: AVC avc: denied { confidentiality } for pid=3028 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 11 00:47:48.195837 kernel: Failed to create system directory nfs4 Jul 11 00:47:48.146000 audit[3028]: AVC avc: denied { confidentiality } for pid=3028 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 11 00:47:48.196731 kernel: Failed to create system directory nfs4 Jul 11 00:47:48.146000 audit[3028]: AVC avc: denied { confidentiality } for pid=3028 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 11 00:47:48.197528 kernel: Failed to create system directory nfs4 Jul 11 00:47:48.146000 audit[3028]: AVC avc: denied { confidentiality } for pid=3028 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 11 00:47:48.198296 kernel: Failed to create system directory nfs4 Jul 11 00:47:48.146000 audit[3028]: AVC avc: denied { confidentiality } for pid=3028 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 11 00:47:48.146000 audit[3028]: AVC avc: denied { confidentiality } for pid=3028 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 11 00:47:48.199735 kernel: Failed to create system directory nfs4 Jul 11 00:47:48.199779 kernel: Failed to create system directory nfs4 Jul 11 00:47:48.199797 kernel: Failed to create system directory nfs4 Jul 11 00:47:48.146000 audit[3028]: AVC avc: denied { confidentiality } for pid=3028 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 11 00:47:48.146000 audit[3028]: AVC avc: denied { confidentiality } for pid=3028 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 11 00:47:48.146000 audit[3028]: AVC avc: denied { confidentiality } for pid=3028 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 11 00:47:48.201578 kernel: Failed to create system directory nfs4 Jul 11 00:47:48.201608 kernel: Failed to create system directory nfs4 Jul 11 00:47:48.201622 kernel: Failed to create system directory nfs4 Jul 11 00:47:48.146000 audit[3028]: AVC avc: denied { confidentiality } for pid=3028 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 11 00:47:48.146000 audit[3028]: AVC avc: denied { confidentiality } for pid=3028 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 11 00:47:48.146000 audit[3028]: AVC avc: denied { confidentiality } for pid=3028 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 11 00:47:48.203269 kernel: Failed to create system directory nfs4 Jul 11 00:47:48.203297 kernel: Failed to create system directory nfs4 Jul 11 00:47:48.203311 kernel: Failed to create system directory nfs4 Jul 11 00:47:48.146000 audit[3028]: AVC avc: denied { confidentiality } for pid=3028 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 11 00:47:48.146000 audit[3028]: AVC avc: denied { confidentiality } for pid=3028 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 11 00:47:48.204436 kernel: Failed to create system directory nfs4 Jul 11 00:47:48.204475 kernel: Failed to create system directory nfs4 Jul 11 00:47:48.146000 audit[3028]: AVC avc: denied { confidentiality } for pid=3028 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 11 00:47:48.146000 audit[3028]: AVC avc: denied { confidentiality } for pid=3028 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 11 00:47:48.205569 kernel: Failed to create system directory nfs4 Jul 11 00:47:48.205607 kernel: Failed to create system directory nfs4 Jul 11 00:47:48.146000 audit[3028]: AVC avc: denied { confidentiality } for pid=3028 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 11 00:47:48.206130 kernel: Failed to create system directory nfs4 Jul 11 00:47:48.146000 audit[3028]: AVC avc: denied { confidentiality } for pid=3028 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 11 00:47:48.146000 audit[3028]: AVC avc: denied { confidentiality } for pid=3028 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 11 00:47:48.207222 kernel: Failed to create system directory nfs4 Jul 11 00:47:48.146000 audit[3028]: AVC avc: denied { confidentiality } for pid=3028 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 11 00:47:48.146000 audit[3028]: AVC avc: denied { confidentiality } for pid=3028 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 11 00:47:48.208348 kernel: Failed to create system directory nfs4 Jul 11 00:47:48.208370 kernel: Failed to create system directory nfs4 Jul 11 00:47:48.208384 kernel: Failed to create system directory nfs4 Jul 11 00:47:48.146000 audit[3028]: AVC avc: denied { confidentiality } for pid=3028 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 11 00:47:48.146000 audit[3028]: AVC avc: denied { confidentiality } for pid=3028 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 11 00:47:48.209487 kernel: Failed to create system directory nfs4 Jul 11 00:47:48.209514 kernel: Failed to create system directory nfs4 Jul 11 00:47:48.146000 audit[3028]: AVC avc: denied { confidentiality } for pid=3028 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 11 00:47:48.146000 audit[3028]: AVC avc: denied { confidentiality } for pid=3028 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 11 00:47:48.146000 audit[3028]: AVC avc: denied { confidentiality } for pid=3028 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 11 00:47:48.211647 kernel: Failed to create system directory nfs4 Jul 11 00:47:48.211671 kernel: Failed to create system directory nfs4 Jul 11 00:47:48.146000 audit[3028]: AVC avc: denied { confidentiality } for pid=3028 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 11 00:47:48.212244 kernel: Failed to create system directory nfs4 Jul 11 00:47:48.146000 audit[3028]: AVC avc: denied { confidentiality } for pid=3028 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 11 00:47:48.146000 audit[3028]: AVC avc: denied { confidentiality } for pid=3028 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 11 00:47:48.213523 kernel: Failed to create system directory nfs4 Jul 11 00:47:48.213548 kernel: Failed to create system directory nfs4 Jul 11 00:47:48.213562 kernel: Failed to create system directory nfs4 Jul 11 00:47:48.146000 audit[3028]: AVC avc: denied { confidentiality } for pid=3028 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 11 00:47:48.214128 kernel: Failed to create system directory nfs4 Jul 11 00:47:48.146000 audit[3028]: AVC avc: denied { confidentiality } for pid=3028 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 11 00:47:48.146000 audit[3028]: AVC avc: denied { confidentiality } for pid=3028 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 11 00:47:48.215221 kernel: Failed to create system directory nfs4 Jul 11 00:47:48.319242 kernel: NFS: Registering the id_resolver key type Jul 11 00:47:48.319396 kernel: Key type id_resolver registered Jul 11 00:47:48.319434 kernel: Key type id_legacy registered Jul 11 00:47:48.146000 audit[3028]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=ffffb8efa010 a1=19c79c a2=aaaac599e028 a3=aaaacbb69010 items=0 ppid=698 pid=3028 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 11 00:47:48.146000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D006E66737634 Jul 11 00:47:48.328000 audit[3032]: AVC avc: denied { confidentiality } for pid=3032 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 11 00:47:48.328000 audit[3032]: AVC avc: denied { confidentiality } for pid=3032 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 11 00:47:48.333559 kernel: Failed to create system directory rpcgss Jul 11 00:47:48.333636 kernel: Failed to create system directory rpcgss Jul 11 00:47:48.333655 kernel: Failed to create system directory rpcgss Jul 11 00:47:48.328000 audit[3032]: AVC avc: denied { confidentiality } for pid=3032 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 11 00:47:48.334355 kernel: Failed to create system directory rpcgss Jul 11 00:47:48.328000 audit[3032]: AVC avc: denied { confidentiality } for pid=3032 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 11 00:47:48.328000 audit[3032]: AVC avc: denied { confidentiality } for pid=3032 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 11 00:47:48.335167 kernel: Failed to create system directory rpcgss Jul 11 00:47:48.328000 audit[3032]: AVC avc: denied { confidentiality } for pid=3032 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 11 00:47:48.336529 kernel: Failed to create system directory rpcgss Jul 11 00:47:48.336592 kernel: Failed to create system directory rpcgss Jul 11 00:47:48.328000 audit[3032]: AVC avc: denied { confidentiality } for pid=3032 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 11 00:47:48.337286 kernel: Failed to create system directory rpcgss Jul 11 00:47:48.328000 audit[3032]: AVC avc: denied { confidentiality } for pid=3032 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 11 00:47:48.328000 audit[3032]: AVC avc: denied { confidentiality } for pid=3032 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 11 00:47:48.338129 kernel: Failed to create system directory rpcgss Jul 11 00:47:48.328000 audit[3032]: AVC avc: denied { confidentiality } for pid=3032 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 11 00:47:48.339407 kernel: Failed to create system directory rpcgss Jul 11 00:47:48.339473 kernel: Failed to create system directory rpcgss Jul 11 00:47:48.328000 audit[3032]: AVC avc: denied { confidentiality } for pid=3032 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 11 00:47:48.340155 kernel: Failed to create system directory rpcgss Jul 11 00:47:48.328000 audit[3032]: AVC avc: denied { confidentiality } for pid=3032 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 11 00:47:48.328000 audit[3032]: AVC avc: denied { confidentiality } for pid=3032 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 11 00:47:48.341578 kernel: Failed to create system directory rpcgss Jul 11 00:47:48.341629 kernel: Failed to create system directory rpcgss Jul 11 00:47:48.328000 audit[3032]: AVC avc: denied { confidentiality } for pid=3032 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 11 00:47:48.342328 kernel: Failed to create system directory rpcgss Jul 11 00:47:48.328000 audit[3032]: AVC avc: denied { confidentiality } for pid=3032 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 11 00:47:48.328000 audit[3032]: AVC avc: denied { confidentiality } for pid=3032 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 11 00:47:48.343149 kernel: Failed to create system directory rpcgss Jul 11 00:47:48.328000 audit[3032]: AVC avc: denied { confidentiality } for pid=3032 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 11 00:47:48.344525 kernel: Failed to create system directory rpcgss Jul 11 00:47:48.344592 kernel: Failed to create system directory rpcgss Jul 11 00:47:48.328000 audit[3032]: AVC avc: denied { confidentiality } for pid=3032 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 11 00:47:48.345285 kernel: Failed to create system directory rpcgss Jul 11 00:47:48.328000 audit[3032]: AVC avc: denied { confidentiality } for pid=3032 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 11 00:47:48.328000 audit[3032]: AVC avc: denied { confidentiality } for pid=3032 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 11 00:47:48.346731 kernel: Failed to create system directory rpcgss Jul 11 00:47:48.346793 kernel: Failed to create system directory rpcgss Jul 11 00:47:48.328000 audit[3032]: AVC avc: denied { confidentiality } for pid=3032 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 11 00:47:48.347501 kernel: Failed to create system directory rpcgss Jul 11 00:47:48.328000 audit[3032]: AVC avc: denied { confidentiality } for pid=3032 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 11 00:47:48.328000 audit[3032]: AVC avc: denied { confidentiality } for pid=3032 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 11 00:47:48.348253 kernel: Failed to create system directory rpcgss Jul 11 00:47:48.348279 kernel: Failed to create system directory rpcgss Jul 11 00:47:48.328000 audit[3032]: AVC avc: denied { confidentiality } for pid=3032 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 11 00:47:48.328000 audit[3032]: AVC avc: denied { confidentiality } for pid=3032 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 11 00:47:48.349429 kernel: Failed to create system directory rpcgss Jul 11 00:47:48.349451 kernel: Failed to create system directory rpcgss Jul 11 00:47:48.328000 audit[3032]: AVC avc: denied { confidentiality } for pid=3032 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 11 00:47:48.328000 audit[3032]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=ffff85e52010 a1=5ee94 a2=aaaaae3de028 a3=aaaad77ac010 items=0 ppid=698 pid=3032 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 11 00:47:48.328000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D007270632D617574682D36 Jul 11 00:47:48.365011 nfsidmap[3039]: nss_getpwnam: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain 'localdomain' Jul 11 00:47:48.367834 nfsidmap[3042]: nss_name_to_gid: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain 'localdomain' Jul 11 00:47:48.374000 audit[1282]: AVC avc: denied { watch_reads } for pid=1282 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2672 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Jul 11 00:47:48.374000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2672 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Jul 11 00:47:48.374000 audit[1282]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=e a1=aaaab5a650d0 a2=10 a3=0 items=0 ppid=1 pid=1282 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 11 00:47:48.374000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2672 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Jul 11 00:47:48.374000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Jul 11 00:47:48.374000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2672 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Jul 11 00:47:48.374000 audit[1282]: AVC avc: denied { watch_reads } for pid=1282 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2672 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Jul 11 00:47:48.374000 audit[1282]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=e a1=aaaab5a650d0 a2=10 a3=0 items=0 ppid=1 pid=1282 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 11 00:47:48.374000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Jul 11 00:47:48.374000 audit[1282]: AVC avc: denied { watch_reads } for pid=1282 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2672 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Jul 11 00:47:48.374000 audit[1282]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=e a1=aaaab5a650d0 a2=10 a3=0 items=0 ppid=1 pid=1282 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 11 00:47:48.374000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Jul 11 00:47:48.589339 env[1214]: time="2025-07-11T00:47:48.589288909Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:53c850fc-0675-4b42-8469-4cbe1223a5e4,Namespace:default,Attempt:0,}" Jul 11 00:47:48.713216 systemd-networkd[1057]: cali5ec59c6bf6e: Link UP Jul 11 00:47:48.715691 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Jul 11 00:47:48.716057 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali5ec59c6bf6e: link becomes ready Jul 11 00:47:48.715798 systemd-networkd[1057]: cali5ec59c6bf6e: Gained carrier Jul 11 00:47:48.725594 env[1214]: 2025-07-11 00:47:48.643 [INFO][3045] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.0.0.4-k8s-test--pod--1-eth0 default 53c850fc-0675-4b42-8469-4cbe1223a5e4 1397 0 2025-07-11 00:47:37 +0000 UTC map[projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 10.0.0.4 test-pod-1 eth0 default [] [] [kns.default ksa.default.default] cali5ec59c6bf6e [] [] }} ContainerID="0a9c72f013fbf770cb9635a505566f0df10e3aaa976ab9b528be157eacc2910f" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.4-k8s-test--pod--1-" Jul 11 00:47:48.725594 env[1214]: 2025-07-11 00:47:48.643 [INFO][3045] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="0a9c72f013fbf770cb9635a505566f0df10e3aaa976ab9b528be157eacc2910f" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.4-k8s-test--pod--1-eth0" Jul 11 00:47:48.725594 env[1214]: 2025-07-11 00:47:48.668 [INFO][3060] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="0a9c72f013fbf770cb9635a505566f0df10e3aaa976ab9b528be157eacc2910f" HandleID="k8s-pod-network.0a9c72f013fbf770cb9635a505566f0df10e3aaa976ab9b528be157eacc2910f" Workload="10.0.0.4-k8s-test--pod--1-eth0" Jul 11 00:47:48.725594 env[1214]: 2025-07-11 00:47:48.668 [INFO][3060] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="0a9c72f013fbf770cb9635a505566f0df10e3aaa976ab9b528be157eacc2910f" HandleID="k8s-pod-network.0a9c72f013fbf770cb9635a505566f0df10e3aaa976ab9b528be157eacc2910f" Workload="10.0.0.4-k8s-test--pod--1-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x400004d7a0), Attrs:map[string]string{"namespace":"default", "node":"10.0.0.4", "pod":"test-pod-1", "timestamp":"2025-07-11 00:47:48.668790391 +0000 UTC"}, Hostname:"10.0.0.4", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Jul 11 00:47:48.725594 env[1214]: 2025-07-11 00:47:48.668 [INFO][3060] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Jul 11 00:47:48.725594 env[1214]: 2025-07-11 00:47:48.669 [INFO][3060] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Jul 11 00:47:48.725594 env[1214]: 2025-07-11 00:47:48.669 [INFO][3060] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.0.0.4' Jul 11 00:47:48.725594 env[1214]: 2025-07-11 00:47:48.682 [INFO][3060] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.0a9c72f013fbf770cb9635a505566f0df10e3aaa976ab9b528be157eacc2910f" host="10.0.0.4" Jul 11 00:47:48.725594 env[1214]: 2025-07-11 00:47:48.688 [INFO][3060] ipam/ipam.go 394: Looking up existing affinities for host host="10.0.0.4" Jul 11 00:47:48.725594 env[1214]: 2025-07-11 00:47:48.694 [INFO][3060] ipam/ipam.go 511: Trying affinity for 192.168.99.192/26 host="10.0.0.4" Jul 11 00:47:48.725594 env[1214]: 2025-07-11 00:47:48.696 [INFO][3060] ipam/ipam.go 158: Attempting to load block cidr=192.168.99.192/26 host="10.0.0.4" Jul 11 00:47:48.725594 env[1214]: 2025-07-11 00:47:48.698 [INFO][3060] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.99.192/26 host="10.0.0.4" Jul 11 00:47:48.725594 env[1214]: 2025-07-11 00:47:48.698 [INFO][3060] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.99.192/26 handle="k8s-pod-network.0a9c72f013fbf770cb9635a505566f0df10e3aaa976ab9b528be157eacc2910f" host="10.0.0.4" Jul 11 00:47:48.725594 env[1214]: 2025-07-11 00:47:48.700 [INFO][3060] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.0a9c72f013fbf770cb9635a505566f0df10e3aaa976ab9b528be157eacc2910f Jul 11 00:47:48.725594 env[1214]: 2025-07-11 00:47:48.704 [INFO][3060] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.99.192/26 handle="k8s-pod-network.0a9c72f013fbf770cb9635a505566f0df10e3aaa976ab9b528be157eacc2910f" host="10.0.0.4" Jul 11 00:47:48.725594 env[1214]: 2025-07-11 00:47:48.709 [INFO][3060] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.99.197/26] block=192.168.99.192/26 handle="k8s-pod-network.0a9c72f013fbf770cb9635a505566f0df10e3aaa976ab9b528be157eacc2910f" host="10.0.0.4" Jul 11 00:47:48.725594 env[1214]: 2025-07-11 00:47:48.709 [INFO][3060] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.99.197/26] handle="k8s-pod-network.0a9c72f013fbf770cb9635a505566f0df10e3aaa976ab9b528be157eacc2910f" host="10.0.0.4" Jul 11 00:47:48.725594 env[1214]: 2025-07-11 00:47:48.709 [INFO][3060] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Jul 11 00:47:48.725594 env[1214]: 2025-07-11 00:47:48.709 [INFO][3060] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.99.197/26] IPv6=[] ContainerID="0a9c72f013fbf770cb9635a505566f0df10e3aaa976ab9b528be157eacc2910f" HandleID="k8s-pod-network.0a9c72f013fbf770cb9635a505566f0df10e3aaa976ab9b528be157eacc2910f" Workload="10.0.0.4-k8s-test--pod--1-eth0" Jul 11 00:47:48.725594 env[1214]: 2025-07-11 00:47:48.710 [INFO][3045] cni-plugin/k8s.go 418: Populated endpoint ContainerID="0a9c72f013fbf770cb9635a505566f0df10e3aaa976ab9b528be157eacc2910f" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.4-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.4-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"53c850fc-0675-4b42-8469-4cbe1223a5e4", ResourceVersion:"1397", Generation:0, CreationTimestamp:time.Date(2025, time.July, 11, 0, 47, 37, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.4", ContainerID:"", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.99.197/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Jul 11 00:47:48.726322 env[1214]: 2025-07-11 00:47:48.711 [INFO][3045] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.99.197/32] ContainerID="0a9c72f013fbf770cb9635a505566f0df10e3aaa976ab9b528be157eacc2910f" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.4-k8s-test--pod--1-eth0" Jul 11 00:47:48.726322 env[1214]: 2025-07-11 00:47:48.711 [INFO][3045] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali5ec59c6bf6e ContainerID="0a9c72f013fbf770cb9635a505566f0df10e3aaa976ab9b528be157eacc2910f" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.4-k8s-test--pod--1-eth0" Jul 11 00:47:48.726322 env[1214]: 2025-07-11 00:47:48.716 [INFO][3045] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="0a9c72f013fbf770cb9635a505566f0df10e3aaa976ab9b528be157eacc2910f" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.4-k8s-test--pod--1-eth0" Jul 11 00:47:48.726322 env[1214]: 2025-07-11 00:47:48.716 [INFO][3045] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="0a9c72f013fbf770cb9635a505566f0df10e3aaa976ab9b528be157eacc2910f" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.4-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.4-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"53c850fc-0675-4b42-8469-4cbe1223a5e4", ResourceVersion:"1397", Generation:0, CreationTimestamp:time.Date(2025, time.July, 11, 0, 47, 37, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.4", ContainerID:"0a9c72f013fbf770cb9635a505566f0df10e3aaa976ab9b528be157eacc2910f", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.99.197/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"8e:71:eb:2f:4d:46", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Jul 11 00:47:48.726322 env[1214]: 2025-07-11 00:47:48.723 [INFO][3045] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="0a9c72f013fbf770cb9635a505566f0df10e3aaa976ab9b528be157eacc2910f" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.4-k8s-test--pod--1-eth0" Jul 11 00:47:48.734000 audit[3088]: NETFILTER_CFG table=filter:99 family=2 entries=36 op=nft_register_chain pid=3088 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 11 00:47:48.734000 audit[3088]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=19116 a0=3 a1=fffffd985e10 a2=0 a3=ffffacdb0fa8 items=0 ppid=2141 pid=3088 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 11 00:47:48.734000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 11 00:47:48.736475 env[1214]: time="2025-07-11T00:47:48.735496029Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 11 00:47:48.736475 env[1214]: time="2025-07-11T00:47:48.735550468Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 11 00:47:48.736475 env[1214]: time="2025-07-11T00:47:48.735566307Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 11 00:47:48.736475 env[1214]: time="2025-07-11T00:47:48.735713304Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/0a9c72f013fbf770cb9635a505566f0df10e3aaa976ab9b528be157eacc2910f pid=3083 runtime=io.containerd.runc.v2 Jul 11 00:47:48.745947 systemd[1]: Started cri-containerd-0a9c72f013fbf770cb9635a505566f0df10e3aaa976ab9b528be157eacc2910f.scope. Jul 11 00:47:48.787000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:48.787000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:48.787000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:48.787000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:48.787000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:48.787000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:48.787000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:48.787000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:48.787000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:48.787000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:48.787000 audit: BPF prog-id=131 op=LOAD Jul 11 00:47:48.788000 audit[3092]: AVC avc: denied { bpf } for pid=3092 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:48.788000 audit[3092]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=3083 pid=3092 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 11 00:47:48.788000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3061396337326630313366626637373063623936333561353035353636 Jul 11 00:47:48.788000 audit[3092]: AVC avc: denied { perfmon } for pid=3092 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:48.788000 audit[3092]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=3083 pid=3092 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 11 00:47:48.788000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3061396337326630313366626637373063623936333561353035353636 Jul 11 00:47:48.788000 audit[3092]: AVC avc: denied { bpf } for pid=3092 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:48.788000 audit[3092]: AVC avc: denied { bpf } for pid=3092 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:48.788000 audit[3092]: AVC avc: denied { bpf } for pid=3092 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:48.788000 audit[3092]: AVC avc: denied { perfmon } for pid=3092 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:48.788000 audit[3092]: AVC avc: denied { perfmon } for pid=3092 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:48.788000 audit[3092]: AVC avc: denied { perfmon } for pid=3092 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:48.788000 audit[3092]: AVC avc: denied { perfmon } for pid=3092 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:48.788000 audit[3092]: AVC avc: denied { perfmon } for pid=3092 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:48.788000 audit[3092]: AVC avc: denied { bpf } for pid=3092 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:48.788000 audit[3092]: AVC avc: denied { bpf } for pid=3092 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:48.788000 audit: BPF prog-id=132 op=LOAD Jul 11 00:47:48.788000 audit[3092]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=3083 pid=3092 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 11 00:47:48.788000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3061396337326630313366626637373063623936333561353035353636 Jul 11 00:47:48.788000 audit[3092]: AVC avc: denied { bpf } for pid=3092 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:48.788000 audit[3092]: AVC avc: denied { bpf } for pid=3092 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:48.788000 audit[3092]: AVC avc: denied { perfmon } for pid=3092 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:48.788000 audit[3092]: AVC avc: denied { perfmon } for pid=3092 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:48.788000 audit[3092]: AVC avc: denied { perfmon } for pid=3092 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:48.788000 audit[3092]: AVC avc: denied { perfmon } for pid=3092 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:48.788000 audit[3092]: AVC avc: denied { perfmon } for pid=3092 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:48.788000 audit[3092]: AVC avc: denied { bpf } for pid=3092 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:48.788000 audit[3092]: AVC avc: denied { bpf } for pid=3092 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:48.788000 audit: BPF prog-id=133 op=LOAD Jul 11 00:47:48.788000 audit[3092]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=3083 pid=3092 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 11 00:47:48.788000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3061396337326630313366626637373063623936333561353035353636 Jul 11 00:47:48.788000 audit: BPF prog-id=133 op=UNLOAD Jul 11 00:47:48.788000 audit: BPF prog-id=132 op=UNLOAD Jul 11 00:47:48.788000 audit[3092]: AVC avc: denied { bpf } for pid=3092 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:48.788000 audit[3092]: AVC avc: denied { bpf } for pid=3092 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:48.788000 audit[3092]: AVC avc: denied { bpf } for pid=3092 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:48.788000 audit[3092]: AVC avc: denied { perfmon } for pid=3092 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:48.788000 audit[3092]: AVC avc: denied { perfmon } for pid=3092 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:48.788000 audit[3092]: AVC avc: denied { perfmon } for pid=3092 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:48.788000 audit[3092]: AVC avc: denied { perfmon } for pid=3092 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:48.788000 audit[3092]: AVC avc: denied { perfmon } for pid=3092 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:48.788000 audit[3092]: AVC avc: denied { bpf } for pid=3092 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:48.788000 audit[3092]: AVC avc: denied { bpf } for pid=3092 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:48.788000 audit: BPF prog-id=134 op=LOAD Jul 11 00:47:48.788000 audit[3092]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=3083 pid=3092 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 11 00:47:48.788000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3061396337326630313366626637373063623936333561353035353636 Jul 11 00:47:48.789958 systemd-resolved[1156]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Jul 11 00:47:48.807354 env[1214]: time="2025-07-11T00:47:48.807311197Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:53c850fc-0675-4b42-8469-4cbe1223a5e4,Namespace:default,Attempt:0,} returns sandbox id \"0a9c72f013fbf770cb9635a505566f0df10e3aaa976ab9b528be157eacc2910f\"" Jul 11 00:47:48.808602 env[1214]: time="2025-07-11T00:47:48.808553490Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" Jul 11 00:47:49.024478 env[1214]: time="2025-07-11T00:47:49.024430806Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 11 00:47:49.025613 env[1214]: time="2025-07-11T00:47:49.025571422Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:cd8b38a4e22587134e82fff3512a99b84799274d989a1ec20f58c7f8c89b8511,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 11 00:47:49.027263 env[1214]: time="2025-07-11T00:47:49.027232828Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 11 00:47:49.029650 env[1214]: time="2025-07-11T00:47:49.029623579Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx@sha256:30bb68e656e0665bce700e67d2756f68bdca3345fa1099a32bfdb8febcf621cd,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 11 00:47:49.030277 env[1214]: time="2025-07-11T00:47:49.030253486Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:cd8b38a4e22587134e82fff3512a99b84799274d989a1ec20f58c7f8c89b8511\"" Jul 11 00:47:49.034607 env[1214]: time="2025-07-11T00:47:49.034562197Z" level=info msg="CreateContainer within sandbox \"0a9c72f013fbf770cb9635a505566f0df10e3aaa976ab9b528be157eacc2910f\" for container &ContainerMetadata{Name:test,Attempt:0,}" Jul 11 00:47:49.047042 env[1214]: time="2025-07-11T00:47:49.046987741Z" level=info msg="CreateContainer within sandbox \"0a9c72f013fbf770cb9635a505566f0df10e3aaa976ab9b528be157eacc2910f\" for &ContainerMetadata{Name:test,Attempt:0,} returns container id \"7b4cfbd50410a2d99f83065afc85843beb16662b823456f25c727926f5414ea4\"" Jul 11 00:47:49.047529 env[1214]: time="2025-07-11T00:47:49.047492691Z" level=info msg="StartContainer for \"7b4cfbd50410a2d99f83065afc85843beb16662b823456f25c727926f5414ea4\"" Jul 11 00:47:49.065972 systemd[1]: Started cri-containerd-7b4cfbd50410a2d99f83065afc85843beb16662b823456f25c727926f5414ea4.scope. Jul 11 00:47:49.085299 kubelet[1454]: E0711 00:47:49.083825 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 11 00:47:49.092000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:49.092000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:49.092000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:49.092000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:49.092000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:49.092000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:49.092000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:49.092000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:49.092000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:49.093000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:49.093000 audit: BPF prog-id=135 op=LOAD Jul 11 00:47:49.093000 audit[3126]: AVC avc: denied { bpf } for pid=3126 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:49.093000 audit[3126]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=3083 pid=3126 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 11 00:47:49.093000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3762346366626435303431306132643939663833303635616663383538 Jul 11 00:47:49.093000 audit[3126]: AVC avc: denied { perfmon } for pid=3126 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:49.093000 audit[3126]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=3083 pid=3126 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 11 00:47:49.093000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3762346366626435303431306132643939663833303635616663383538 Jul 11 00:47:49.093000 audit[3126]: AVC avc: denied { bpf } for pid=3126 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:49.093000 audit[3126]: AVC avc: denied { bpf } for pid=3126 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:49.093000 audit[3126]: AVC avc: denied { bpf } for pid=3126 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:49.093000 audit[3126]: AVC avc: denied { perfmon } for pid=3126 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:49.093000 audit[3126]: AVC avc: denied { perfmon } for pid=3126 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:49.093000 audit[3126]: AVC avc: denied { perfmon } for pid=3126 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:49.093000 audit[3126]: AVC avc: denied { perfmon } for pid=3126 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:49.093000 audit[3126]: AVC avc: denied { perfmon } for pid=3126 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:49.093000 audit[3126]: AVC avc: denied { bpf } for pid=3126 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:49.093000 audit[3126]: AVC avc: denied { bpf } for pid=3126 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:49.093000 audit: BPF prog-id=136 op=LOAD Jul 11 00:47:49.093000 audit[3126]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=3083 pid=3126 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 11 00:47:49.093000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3762346366626435303431306132643939663833303635616663383538 Jul 11 00:47:49.093000 audit[3126]: AVC avc: denied { bpf } for pid=3126 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:49.093000 audit[3126]: AVC avc: denied { bpf } for pid=3126 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:49.093000 audit[3126]: AVC avc: denied { perfmon } for pid=3126 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:49.093000 audit[3126]: AVC avc: denied { perfmon } for pid=3126 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:49.093000 audit[3126]: AVC avc: denied { perfmon } for pid=3126 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:49.093000 audit[3126]: AVC avc: denied { perfmon } for pid=3126 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:49.093000 audit[3126]: AVC avc: denied { perfmon } for pid=3126 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:49.093000 audit[3126]: AVC avc: denied { bpf } for pid=3126 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:49.093000 audit[3126]: AVC avc: denied { bpf } for pid=3126 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:49.093000 audit: BPF prog-id=137 op=LOAD Jul 11 00:47:49.093000 audit[3126]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=3083 pid=3126 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 11 00:47:49.093000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3762346366626435303431306132643939663833303635616663383538 Jul 11 00:47:49.093000 audit: BPF prog-id=137 op=UNLOAD Jul 11 00:47:49.093000 audit: BPF prog-id=136 op=UNLOAD Jul 11 00:47:49.093000 audit[3126]: AVC avc: denied { bpf } for pid=3126 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:49.093000 audit[3126]: AVC avc: denied { bpf } for pid=3126 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:49.093000 audit[3126]: AVC avc: denied { bpf } for pid=3126 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:49.093000 audit[3126]: AVC avc: denied { perfmon } for pid=3126 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:49.093000 audit[3126]: AVC avc: denied { perfmon } for pid=3126 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:49.093000 audit[3126]: AVC avc: denied { perfmon } for pid=3126 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:49.093000 audit[3126]: AVC avc: denied { perfmon } for pid=3126 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:49.093000 audit[3126]: AVC avc: denied { perfmon } for pid=3126 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:49.093000 audit[3126]: AVC avc: denied { bpf } for pid=3126 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:49.093000 audit[3126]: AVC avc: denied { bpf } for pid=3126 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 11 00:47:49.093000 audit: BPF prog-id=138 op=LOAD Jul 11 00:47:49.093000 audit[3126]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=3083 pid=3126 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 11 00:47:49.093000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3762346366626435303431306132643939663833303635616663383538 Jul 11 00:47:49.107499 env[1214]: time="2025-07-11T00:47:49.107457417Z" level=info msg="StartContainer for \"7b4cfbd50410a2d99f83065afc85843beb16662b823456f25c727926f5414ea4\" returns successfully" Jul 11 00:47:49.143000 audit[3175]: NETFILTER_CFG table=filter:100 family=2 entries=9 op=nft_register_rule pid=3175 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 11 00:47:49.143000 audit[3175]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3016 a0=3 a1=fffffe822520 a2=0 a3=1 items=0 ppid=1622 pid=3175 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 11 00:47:49.143000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 11 00:47:49.154000 audit[3175]: NETFILTER_CFG table=nat:101 family=2 entries=55 op=nft_register_chain pid=3175 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 11 00:47:49.154000 audit[3175]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=20100 a0=3 a1=fffffe822520 a2=0 a3=1 items=0 ppid=1622 pid=3175 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 11 00:47:49.154000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 11 00:47:49.354694 kubelet[1454]: I0711 00:47:49.354551 1454 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="default/test-pod-1" podStartSLOduration=12.130968736 podStartE2EDuration="12.354537452s" podCreationTimestamp="2025-07-11 00:47:37 +0000 UTC" firstStartedPulling="2025-07-11 00:47:48.808058541 +0000 UTC m=+41.267846723" lastFinishedPulling="2025-07-11 00:47:49.031627257 +0000 UTC m=+41.491415439" observedRunningTime="2025-07-11 00:47:49.35413174 +0000 UTC m=+41.813919922" watchObservedRunningTime="2025-07-11 00:47:49.354537452 +0000 UTC m=+41.814325594" Jul 11 00:47:49.895859 systemd[1]: run-containerd-runc-k8s.io-7b4cfbd50410a2d99f83065afc85843beb16662b823456f25c727926f5414ea4-runc.wWDRk1.mount: Deactivated successfully. Jul 11 00:47:50.085752 kubelet[1454]: E0711 00:47:50.085710 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 11 00:47:50.348332 systemd-networkd[1057]: cali5ec59c6bf6e: Gained IPv6LL Jul 11 00:47:51.086696 kubelet[1454]: E0711 00:47:51.086650 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 11 00:47:51.945369 kubelet[1454]: I0711 00:47:51.945332 1454 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Jul 11 00:47:51.977000 audit[3177]: NETFILTER_CFG table=filter:102 family=2 entries=8 op=nft_register_rule pid=3177 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 11 00:47:51.977000 audit[3177]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3016 a0=3 a1=ffffc21fb160 a2=0 a3=1 items=0 ppid=1622 pid=3177 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 11 00:47:51.977000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 11 00:47:51.989000 audit[3177]: NETFILTER_CFG table=nat:103 family=2 entries=62 op=nft_register_chain pid=3177 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 11 00:47:51.989000 audit[3177]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=21988 a0=3 a1=ffffc21fb160 a2=0 a3=1 items=0 ppid=1622 pid=3177 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 11 00:47:51.989000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 11 00:47:52.014000 audit[3179]: NETFILTER_CFG table=filter:104 family=2 entries=8 op=nft_register_rule pid=3179 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 11 00:47:52.014000 audit[3179]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3016 a0=3 a1=ffffc71d23e0 a2=0 a3=1 items=0 ppid=1622 pid=3179 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 11 00:47:52.014000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 11 00:47:52.025000 audit[3179]: NETFILTER_CFG table=nat:105 family=2 entries=64 op=nft_register_rule pid=3179 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 11 00:47:52.025000 audit[3179]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=21988 a0=3 a1=ffffc71d23e0 a2=0 a3=1 items=0 ppid=1622 pid=3179 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 11 00:47:52.025000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 11 00:47:52.087770 kubelet[1454]: E0711 00:47:52.087714 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 11 00:47:53.042000 audit[3181]: NETFILTER_CFG table=filter:106 family=2 entries=8 op=nft_register_rule pid=3181 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 11 00:47:53.044668 kernel: kauditd_printk_skb: 480 callbacks suppressed Jul 11 00:47:53.044716 kernel: audit: type=1325 audit(1752194873.042:871): table=filter:106 family=2 entries=8 op=nft_register_rule pid=3181 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 11 00:47:53.042000 audit[3181]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3016 a0=3 a1=ffffe9f7f920 a2=0 a3=1 items=0 ppid=1622 pid=3181 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 11 00:47:53.050057 kernel: audit: type=1300 audit(1752194873.042:871): arch=c00000b7 syscall=211 success=yes exit=3016 a0=3 a1=ffffe9f7f920 a2=0 a3=1 items=0 ppid=1622 pid=3181 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 11 00:47:53.050112 kernel: audit: type=1327 audit(1752194873.042:871): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 11 00:47:53.042000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 11 00:47:53.053000 audit[3181]: NETFILTER_CFG table=nat:107 family=2 entries=64 op=nft_register_rule pid=3181 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 11 00:47:53.053000 audit[3181]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=21988 a0=3 a1=ffffe9f7f920 a2=0 a3=1 items=0 ppid=1622 pid=3181 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 11 00:47:53.060064 kernel: audit: type=1325 audit(1752194873.053:872): table=nat:107 family=2 entries=64 op=nft_register_rule pid=3181 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 11 00:47:53.060097 kernel: audit: type=1300 audit(1752194873.053:872): arch=c00000b7 syscall=211 success=yes exit=21988 a0=3 a1=ffffe9f7f920 a2=0 a3=1 items=0 ppid=1622 pid=3181 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 11 00:47:53.060140 kernel: audit: type=1327 audit(1752194873.053:872): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 11 00:47:53.053000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 11 00:47:53.088303 kubelet[1454]: E0711 00:47:53.088245 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 11 00:47:54.088575 kubelet[1454]: E0711 00:47:54.088528 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"